Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2012

AUTHORS

Carmit Hazay , Gert Læssøe Mikkelsen , Tal Rabin , Tomas Toft

ABSTRACT

The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite with security against malicious behavior in the two party setting. Our second contribution is a complete Paillier [37] threshold encryption scheme in the two-party setting with security against malicious behavior. Our RSA key generation is comprised of the following: (i) a distributed protocol for generation of an RSA composite, and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite as public key and is comprised of: (i) a distributed generation of the corresponding secret-key shares and, (ii) a distributed decryption protocol for decrypting according to Paillier. More... »

PAGES

313-331

Book

TITLE

Topics in Cryptology – CT-RSA 2012

ISBN

978-3-642-27953-9
978-3-642-27954-6

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-27954-6_20

DOI

http://dx.doi.org/10.1007/978-3-642-27954-6_20

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1030038750


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, Aarhus University, Denmark", 
          "id": "http://www.grid.ac/institutes/grid.7048.b", 
          "name": [
            "Department of Computer Science, Aarhus University, Denmark"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hazay", 
        "givenName": "Carmit", 
        "id": "sg:person.07347002665.54", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07347002665.54"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "The Alexandra Institute, Denmark", 
          "id": "http://www.grid.ac/institutes/grid.423959.0", 
          "name": [
            "The Alexandra Institute, Denmark"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Mikkelsen", 
        "givenName": "Gert L\u00e6ss\u00f8e", 
        "id": "sg:person.016435223651.35", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016435223651.35"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IBM T.J.Watson Research Center, USA", 
          "id": "http://www.grid.ac/institutes/grid.481554.9", 
          "name": [
            "IBM T.J.Watson Research Center, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Rabin", 
        "givenName": "Tal", 
        "id": "sg:person.015473523512.58", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015473523512.58"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, Aarhus University, Denmark", 
          "id": "http://www.grid.ac/institutes/grid.7048.b", 
          "name": [
            "Department of Computer Science, Aarhus University, Denmark"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Toft", 
        "givenName": "Tomas", 
        "id": "sg:person.015535116101.78", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015535116101.78"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite with security against malicious behavior in the two party setting. Our second contribution is a complete Paillier [37] threshold encryption scheme in the two-party setting with security against malicious behavior. Our RSA key generation is comprised of the following: (i) a distributed protocol for generation of an RSA composite, and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite as public key and is comprised of: (i) a distributed generation of the corresponding secret-key shares and, (ii) a distributed decryption protocol for decrypting according to Paillier.", 
    "editor": [
      {
        "familyName": "Dunkelman", 
        "givenName": "Orr", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-27954-6_20", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-27953-9", 
        "978-3-642-27954-6"
      ], 
      "name": "Topics in Cryptology \u2013 CT-RSA 2012", 
      "type": "Book"
    }, 
    "keywords": [
      "threshold encryption scheme", 
      "two-party setting", 
      "RSA key generation", 
      "malicious behavior", 
      "encryption scheme", 
      "key generation", 
      "secret key shares", 
      "decryption protocol", 
      "cryptographic protocols", 
      "public key", 
      "second contribution", 
      "Paillier", 
      "first contribution", 
      "security", 
      "party settings", 
      "scheme", 
      "protocol", 
      "Distributed Generation", 
      "RSA", 
      "factorization", 
      "key", 
      "generation", 
      "setting", 
      "contribution", 
      "manner", 
      "behavior", 
      "share", 
      "validity", 
      "test", 
      "composites", 
      "problem"
    ], 
    "name": "Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting", 
    "pagination": "313-331", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1030038750"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-27954-6_20"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-27954-6_20", 
      "https://app.dimensions.ai/details/publication/pub.1030038750"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-20T07:45", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_317.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-27954-6_20"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-27954-6_20'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-27954-6_20'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-27954-6_20'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-27954-6_20'


 

This table displays all metadata directly associated to this object as RDF triples.

118 TRIPLES      23 PREDICATES      57 URIs      50 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-27954-6_20 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N1a8757dad8274532a138a763429065ea
4 schema:datePublished 2012
5 schema:datePublishedReg 2012-01-01
6 schema:description The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite with security against malicious behavior in the two party setting. Our second contribution is a complete Paillier [37] threshold encryption scheme in the two-party setting with security against malicious behavior. Our RSA key generation is comprised of the following: (i) a distributed protocol for generation of an RSA composite, and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite as public key and is comprised of: (i) a distributed generation of the corresponding secret-key shares and, (ii) a distributed decryption protocol for decrypting according to Paillier.
7 schema:editor N40775aad018140778cd83968f52e101e
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N1e1b351aeabd438eabfe5c822503a9b5
12 schema:keywords Distributed Generation
13 Paillier
14 RSA
15 RSA key generation
16 behavior
17 composites
18 contribution
19 cryptographic protocols
20 decryption protocol
21 encryption scheme
22 factorization
23 first contribution
24 generation
25 key
26 key generation
27 malicious behavior
28 manner
29 party settings
30 problem
31 protocol
32 public key
33 scheme
34 second contribution
35 secret key shares
36 security
37 setting
38 share
39 test
40 threshold encryption scheme
41 two-party setting
42 validity
43 schema:name Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
44 schema:pagination 313-331
45 schema:productId N22c94cda0ccd497192b873a05fa1b083
46 Naf0a6ff178f8466abc4779fa20bfeb04
47 schema:publisher Ndd3102369a634d829090803f720b9862
48 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030038750
49 https://doi.org/10.1007/978-3-642-27954-6_20
50 schema:sdDatePublished 2022-05-20T07:45
51 schema:sdLicense https://scigraph.springernature.com/explorer/license/
52 schema:sdPublisher Ndfadaad5a5524267b516321e4218f428
53 schema:url https://doi.org/10.1007/978-3-642-27954-6_20
54 sgo:license sg:explorer/license/
55 sgo:sdDataset chapters
56 rdf:type schema:Chapter
57 N1a8757dad8274532a138a763429065ea rdf:first sg:person.07347002665.54
58 rdf:rest N90109df9d32b48dd997ef4158d372a50
59 N1e1b351aeabd438eabfe5c822503a9b5 schema:isbn 978-3-642-27953-9
60 978-3-642-27954-6
61 schema:name Topics in Cryptology – CT-RSA 2012
62 rdf:type schema:Book
63 N22c94cda0ccd497192b873a05fa1b083 schema:name doi
64 schema:value 10.1007/978-3-642-27954-6_20
65 rdf:type schema:PropertyValue
66 N27dbeaa4ebc940ad9356fcb24e2d4375 rdf:first sg:person.015535116101.78
67 rdf:rest rdf:nil
68 N2d067642ad274841857e6c9f2d3e339b rdf:first sg:person.015473523512.58
69 rdf:rest N27dbeaa4ebc940ad9356fcb24e2d4375
70 N40775aad018140778cd83968f52e101e rdf:first Ne4d5c0d4b1bd40128ec468111826da45
71 rdf:rest rdf:nil
72 N90109df9d32b48dd997ef4158d372a50 rdf:first sg:person.016435223651.35
73 rdf:rest N2d067642ad274841857e6c9f2d3e339b
74 Naf0a6ff178f8466abc4779fa20bfeb04 schema:name dimensions_id
75 schema:value pub.1030038750
76 rdf:type schema:PropertyValue
77 Ndd3102369a634d829090803f720b9862 schema:name Springer Nature
78 rdf:type schema:Organisation
79 Ndfadaad5a5524267b516321e4218f428 schema:name Springer Nature - SN SciGraph project
80 rdf:type schema:Organization
81 Ne4d5c0d4b1bd40128ec468111826da45 schema:familyName Dunkelman
82 schema:givenName Orr
83 rdf:type schema:Person
84 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
85 schema:name Information and Computing Sciences
86 rdf:type schema:DefinedTerm
87 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
88 schema:name Data Format
89 rdf:type schema:DefinedTerm
90 sg:person.015473523512.58 schema:affiliation grid-institutes:grid.481554.9
91 schema:familyName Rabin
92 schema:givenName Tal
93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015473523512.58
94 rdf:type schema:Person
95 sg:person.015535116101.78 schema:affiliation grid-institutes:grid.7048.b
96 schema:familyName Toft
97 schema:givenName Tomas
98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015535116101.78
99 rdf:type schema:Person
100 sg:person.016435223651.35 schema:affiliation grid-institutes:grid.423959.0
101 schema:familyName Mikkelsen
102 schema:givenName Gert Læssøe
103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016435223651.35
104 rdf:type schema:Person
105 sg:person.07347002665.54 schema:affiliation grid-institutes:grid.7048.b
106 schema:familyName Hazay
107 schema:givenName Carmit
108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07347002665.54
109 rdf:type schema:Person
110 grid-institutes:grid.423959.0 schema:alternateName The Alexandra Institute, Denmark
111 schema:name The Alexandra Institute, Denmark
112 rdf:type schema:Organization
113 grid-institutes:grid.481554.9 schema:alternateName IBM T.J.Watson Research Center, USA
114 schema:name IBM T.J.Watson Research Center, USA
115 rdf:type schema:Organization
116 grid-institutes:grid.7048.b schema:alternateName Department of Computer Science, Aarhus University, Denmark
117 schema:name Department of Computer Science, Aarhus University, Denmark
118 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...