Adaptive Security for Threshold Cryptosystems View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

1999-12-16

AUTHORS

Ran Canetti , Rosario Gennaro , Stanisław Jarecki , Hugo Krawczyk , Tal Rabin

ABSTRACT

We present adaptively-secure efficient solutions to several central problems in the area of threshold cryptography. We prove these solutions to withstand adaptive attackers that choose parties for corruption at any time during the run of the protocol. In contrast, all previously known efficient protocols for these problems were proven secure only against less realistic static adversaries that choose and fix the subset of corrupted parties before the start of the protocol run.Specifically, we provide adaptively-secure solutions for distributed key generation in discrete-log based cryptosystems, and for the problem of distributed generation of DSS signatures (threshold DSS). We also show how to transform existent static solutions for threshold RSA and proactive schemes to withstand the stronger adaptive attackers. In doing so, we introduce several techniques for the design and analysis of adaptively-secure protocols that may well find further applications. More... »

PAGES

98-116

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-48405-1_7

DOI

http://dx.doi.org/10.1007/3-540-48405-1_7

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1020284830


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "IBM T.J.Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA", 
          "id": "http://www.grid.ac/institutes/grid.481554.9", 
          "name": [
            "IBM T.J.Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Canetti", 
        "givenName": "Ran", 
        "id": "sg:person.012320111457.74", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012320111457.74"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IBM T.J.Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA", 
          "id": "http://www.grid.ac/institutes/grid.481554.9", 
          "name": [
            "IBM T.J.Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gennaro", 
        "givenName": "Rosario", 
        "id": "sg:person.013573255563.35", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013573255563.35"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "MIT Laboratory for Computer Science, 545 Tech Square, 02139, Cambridge, MA, USA", 
          "id": "http://www.grid.ac/institutes/grid.116068.8", 
          "name": [
            "MIT Laboratory for Computer Science, 545 Tech Square, 02139, Cambridge, MA, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Jarecki", 
        "givenName": "Stanis\u0142aw", 
        "id": "sg:person.014344574541.81", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014344574541.81"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IBM T.J. Watson Research Center, Yorktown Heights, New York, USA", 
          "id": "http://www.grid.ac/institutes/grid.481554.9", 
          "name": [
            "Department of Electrical Engineering, Technion, 32000, Haifa, Israel", 
            "IBM T.J. Watson Research Center, Yorktown Heights, New York, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Krawczyk", 
        "givenName": "Hugo", 
        "id": "sg:person.013004021661.30", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013004021661.30"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IBM T.J.Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA", 
          "id": "http://www.grid.ac/institutes/grid.481554.9", 
          "name": [
            "IBM T.J.Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Rabin", 
        "givenName": "Tal", 
        "id": "sg:person.015473523512.58", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015473523512.58"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1999-12-16", 
    "datePublishedReg": "1999-12-16", 
    "description": "We present adaptively-secure efficient solutions to several central problems in the area of threshold cryptography. We prove these solutions to withstand adaptive attackers that choose parties for corruption at any time during the run of the protocol. In contrast, all previously known efficient protocols for these problems were proven secure only against less realistic static adversaries that choose and fix the subset of corrupted parties before the start of the protocol run.Specifically, we provide adaptively-secure solutions for distributed key generation in discrete-log based cryptosystems, and for the problem of distributed generation of DSS signatures (threshold DSS). We also show how to transform existent static solutions for threshold RSA and proactive schemes to withstand the stronger adaptive attackers. In doing so, we introduce several techniques for the design and analysis of adaptively-secure protocols that may well find further applications.", 
    "editor": [
      {
        "familyName": "Wiener", 
        "givenName": "Michael", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-48405-1_7", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-66347-8", 
        "978-3-540-48405-9"
      ], 
      "name": "Advances in Cryptology \u2014 CRYPTO\u2019 99", 
      "type": "Book"
    }, 
    "keywords": [
      "adaptive attackers", 
      "threshold cryptography", 
      "secure solution", 
      "secure protocol", 
      "threshold cryptosystems", 
      "static adversaries", 
      "adaptive security", 
      "threshold RSA", 
      "key generation", 
      "protocol run", 
      "proactive scheme", 
      "DSS signatures", 
      "efficient solution", 
      "attacker", 
      "cryptosystem", 
      "efficient protocol", 
      "central problem", 
      "cryptography", 
      "protocol", 
      "adversary", 
      "security", 
      "RSA", 
      "solution", 
      "scheme", 
      "parties", 
      "applications", 
      "generation", 
      "further application", 
      "design", 
      "technique", 
      "run", 
      "static solutions", 
      "subset", 
      "signatures", 
      "corruption", 
      "time", 
      "area", 
      "analysis", 
      "start", 
      "contrast", 
      "problem"
    ], 
    "name": "Adaptive Security for Threshold Cryptosystems", 
    "pagination": "98-116", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1020284830"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-48405-1_7"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-48405-1_7", 
      "https://app.dimensions.ai/details/publication/pub.1020284830"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-20T07:42", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_167.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/3-540-48405-1_7"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-48405-1_7'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-48405-1_7'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-48405-1_7'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-48405-1_7'


 

This table displays all metadata directly associated to this object as RDF triples.

139 TRIPLES      23 PREDICATES      67 URIs      59 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-48405-1_7 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 anzsrc-for:0804
4 schema:author N43f8644b13634a67be869aeeaf40141e
5 schema:datePublished 1999-12-16
6 schema:datePublishedReg 1999-12-16
7 schema:description We present adaptively-secure efficient solutions to several central problems in the area of threshold cryptography. We prove these solutions to withstand adaptive attackers that choose parties for corruption at any time during the run of the protocol. In contrast, all previously known efficient protocols for these problems were proven secure only against less realistic static adversaries that choose and fix the subset of corrupted parties before the start of the protocol run.Specifically, we provide adaptively-secure solutions for distributed key generation in discrete-log based cryptosystems, and for the problem of distributed generation of DSS signatures (threshold DSS). We also show how to transform existent static solutions for threshold RSA and proactive schemes to withstand the stronger adaptive attackers. In doing so, we introduce several techniques for the design and analysis of adaptively-secure protocols that may well find further applications.
8 schema:editor Nc41e59ce5d2846a0b369697a23e966ac
9 schema:genre chapter
10 schema:inLanguage en
11 schema:isAccessibleForFree true
12 schema:isPartOf N1bae195315084d52bb4d12f8fed9703c
13 schema:keywords DSS signatures
14 RSA
15 adaptive attackers
16 adaptive security
17 adversary
18 analysis
19 applications
20 area
21 attacker
22 central problem
23 contrast
24 corruption
25 cryptography
26 cryptosystem
27 design
28 efficient protocol
29 efficient solution
30 further application
31 generation
32 key generation
33 parties
34 proactive scheme
35 problem
36 protocol
37 protocol run
38 run
39 scheme
40 secure protocol
41 secure solution
42 security
43 signatures
44 solution
45 start
46 static adversaries
47 static solutions
48 subset
49 technique
50 threshold RSA
51 threshold cryptography
52 threshold cryptosystems
53 time
54 schema:name Adaptive Security for Threshold Cryptosystems
55 schema:pagination 98-116
56 schema:productId N2f873f738e7e4c68be64ea62769c51ce
57 Nb0e18814d447427389381af27f43d2ec
58 schema:publisher N93fed1c0dd15478b9e1a8c74c52a7149
59 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020284830
60 https://doi.org/10.1007/3-540-48405-1_7
61 schema:sdDatePublished 2022-05-20T07:42
62 schema:sdLicense https://scigraph.springernature.com/explorer/license/
63 schema:sdPublisher N90f567e108b043ddae329596ecf3b5f2
64 schema:url https://doi.org/10.1007/3-540-48405-1_7
65 sgo:license sg:explorer/license/
66 sgo:sdDataset chapters
67 rdf:type schema:Chapter
68 N1bae195315084d52bb4d12f8fed9703c schema:isbn 978-3-540-48405-9
69 978-3-540-66347-8
70 schema:name Advances in Cryptology — CRYPTO’ 99
71 rdf:type schema:Book
72 N2f873f738e7e4c68be64ea62769c51ce schema:name doi
73 schema:value 10.1007/3-540-48405-1_7
74 rdf:type schema:PropertyValue
75 N43f8644b13634a67be869aeeaf40141e rdf:first sg:person.012320111457.74
76 rdf:rest N5b9ad120bdc948ec8d74eec5d33171bd
77 N564509ddeabb45ed92109b3188da659d rdf:first sg:person.015473523512.58
78 rdf:rest rdf:nil
79 N5b9ad120bdc948ec8d74eec5d33171bd rdf:first sg:person.013573255563.35
80 rdf:rest Ne488d047b0dc4fd49d64f8db3c7b3cd2
81 N90f567e108b043ddae329596ecf3b5f2 schema:name Springer Nature - SN SciGraph project
82 rdf:type schema:Organization
83 N93fed1c0dd15478b9e1a8c74c52a7149 schema:name Springer Nature
84 rdf:type schema:Organisation
85 Nb0e18814d447427389381af27f43d2ec schema:name dimensions_id
86 schema:value pub.1020284830
87 rdf:type schema:PropertyValue
88 Nc41e59ce5d2846a0b369697a23e966ac rdf:first Nf242d20ae5af4062bca0c2adcf8cbdce
89 rdf:rest rdf:nil
90 Ne45b9836d7a345ba9b0b079f31d40006 rdf:first sg:person.013004021661.30
91 rdf:rest N564509ddeabb45ed92109b3188da659d
92 Ne488d047b0dc4fd49d64f8db3c7b3cd2 rdf:first sg:person.014344574541.81
93 rdf:rest Ne45b9836d7a345ba9b0b079f31d40006
94 Nf242d20ae5af4062bca0c2adcf8cbdce schema:familyName Wiener
95 schema:givenName Michael
96 rdf:type schema:Person
97 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
98 schema:name Information and Computing Sciences
99 rdf:type schema:DefinedTerm
100 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
101 schema:name Computation Theory and Mathematics
102 rdf:type schema:DefinedTerm
103 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
104 schema:name Data Format
105 rdf:type schema:DefinedTerm
106 sg:person.012320111457.74 schema:affiliation grid-institutes:grid.481554.9
107 schema:familyName Canetti
108 schema:givenName Ran
109 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012320111457.74
110 rdf:type schema:Person
111 sg:person.013004021661.30 schema:affiliation grid-institutes:grid.481554.9
112 schema:familyName Krawczyk
113 schema:givenName Hugo
114 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013004021661.30
115 rdf:type schema:Person
116 sg:person.013573255563.35 schema:affiliation grid-institutes:grid.481554.9
117 schema:familyName Gennaro
118 schema:givenName Rosario
119 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013573255563.35
120 rdf:type schema:Person
121 sg:person.014344574541.81 schema:affiliation grid-institutes:grid.116068.8
122 schema:familyName Jarecki
123 schema:givenName Stanisław
124 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014344574541.81
125 rdf:type schema:Person
126 sg:person.015473523512.58 schema:affiliation grid-institutes:grid.481554.9
127 schema:familyName Rabin
128 schema:givenName Tal
129 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015473523512.58
130 rdf:type schema:Person
131 grid-institutes:grid.116068.8 schema:alternateName MIT Laboratory for Computer Science, 545 Tech Square, 02139, Cambridge, MA, USA
132 schema:name MIT Laboratory for Computer Science, 545 Tech Square, 02139, Cambridge, MA, USA
133 rdf:type schema:Organization
134 grid-institutes:grid.481554.9 schema:alternateName IBM T.J. Watson Research Center, Yorktown Heights, New York, USA
135 IBM T.J.Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA
136 schema:name Department of Electrical Engineering, Technion, 32000, Haifa, Israel
137 IBM T.J. Watson Research Center, Yorktown Heights, New York, USA
138 IBM T.J.Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA
139 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...