Exposure - Resilient Cryptography 7 February 2007 Lecture 4 Lecturer :
نویسنده
چکیده
In this lecture, we give a high-level tour of DL-Based Threshold Cryptography. We begin with distributed generation of discrete log keys. We describe two protocols: (1) parallel Feldman and its (limited) security properties – good for adaptive Pedersen VSS, but not when the simulator needs to force the outcome (due to rushing), and (2) parallel Pedersen followed by the first protocol. Next, we describe BLS signatures and their threshold variant. Finally, we describe ElGamal encryption and its threshold variant, which uses an HVZK proof of equality of discrete logs.
منابع مشابه
G22.3033-013 Exposure-resilient Cryptography
We continue our discussion of Verifiable Secret Sharing, giving two instantiations of the general schema from the last lecture. First, using Commit(x) = g: Feldman VSS, which leaks nothing but g and is perfect binding. Second, using Perdersen’s commitment Commit(x; r) = gh: Pedersen VSS. Next, we turn to the problem of adaptive security. We describe an adaptively secure Feldman VSS using trapdo...
متن کاملLeakage-Resilient Symmetric Cryptography
. In Moni Naor, editor, Theory of Cryptography, First Theory of Cryp-tography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004,Proceedings, volume 2951 of Lecture Notes in Computer Science, pages 278–296.Springer, 2004.55. Andrew Moss, Elisabeth Oswald, Dan Page, and Michael Tunstall. Compiler assisted masking. In Prouff and Schaumont [66], pages 58–75.56. Moni...
متن کاملMath 140a: Foundations of Real Analysis I
1. Ordered Sets, Ordered Fields, and Completeness 1 1.1. Lecture 1: January 5, 2016 1 1.2. Lecture 2: January 7, 2016 4 1.3. Lecture 3: January 11, 2016 7 1.4. Lecture 4: January 14, 2014 9 2. Sequences and Limits 13 2.1. Lecture 5: January 19, 2016 13 2.2. Lecture 6: January 21, 2016 15 2.3. Lecture 7: January 26, 2016 18 2.4. Lecture 8: January 28, 2016 21 3. Extensions of R: the Extended Rea...
متن کاملDiscrete Algorithms for Mobile and Wireless Networks Lecture 7 Part B : Tuesday , 6 th February 2007
Time synchronization is essential in distributed systems and the Network Time protocol is used for this purpose across systems in the Internet. In wireless sensor networks and actuators, the precision requirement for time synchronization is in the order of μ-seconds. Various applications of these networks like some domain specific applications such as measurement of time-of-sound, forming a low...
متن کاملHazards of Cold Water—Paul Esser Memorial Lecture 1973
This is an annual lecture given in the University of Bristol 0,1 some subject connected with one of the Water sports, caving or mountaineering. It is in memory ?f Paul Esser, a medical student who lost his life while cave diving in Porth yr Ogof in February of 1971, and who was particularly interested in those sports. The lecturer is chosen by a panel of representatives from the student societi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007