Ontology type: schema:ScholarlyArticle Open Access: True
2018-02-05
AUTHORSCarmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft, Angelo Agatino Nicolosi
ABSTRACTThe problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite with security against malicious behavior. Our second contribution is a complete Paillier (in: EUROCRYPT, pp 223–238, 1999) threshold encryption scheme in the two-party setting with security against malicious attacks. We further describe how to extend our protocols to the multiparty setting with dishonest majority. Our RSA key generation protocol is comprised of the following subprotocols: (i) a distributed protocol for generation of an RSA composite and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite for the public key and is comprised of the following subprotocols: (i) a distributed generation of the corresponding secret key shares and (ii) a distributed decryption protocol for decrypting according to Paillier. More... »
PAGES265-323
http://scigraph.springernature.com/pub.10.1007/s00145-017-9275-7
DOIhttp://dx.doi.org/10.1007/s00145-017-9275-7
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1100836157
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Faculty of Engineering, Bar-Ilan University, Ramat Gan, Israel",
"id": "http://www.grid.ac/institutes/grid.22098.31",
"name": [
"Faculty of Engineering, Bar-Ilan University, Ramat Gan, Israel"
],
"type": "Organization"
},
"familyName": "Hazay",
"givenName": "Carmit",
"id": "sg:person.07347002665.54",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07347002665.54"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "The Alexandra Institute, Aarhus, Denmark",
"id": "http://www.grid.ac/institutes/grid.423959.0",
"name": [
"The Alexandra Institute, Aarhus, Denmark"
],
"type": "Organization"
},
"familyName": "Mikkelsen",
"givenName": "Gert L\u00e6ss\u00f8e",
"id": "sg:person.016435223651.35",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016435223651.35"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "IBM T.J. Watson Research Center, Yorktown Heights, NY, USA",
"id": "http://www.grid.ac/institutes/grid.481554.9",
"name": [
"IBM T.J. Watson Research Center, Yorktown Heights, NY, USA"
],
"type": "Organization"
},
"familyName": "Rabin",
"givenName": "Tal",
"id": "sg:person.015473523512.58",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015473523512.58"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Partisia, Aarhus N, Denmark",
"id": "http://www.grid.ac/institutes/None",
"name": [
"Partisia, Aarhus N, Denmark"
],
"type": "Organization"
},
"familyName": "Toft",
"givenName": "Tomas",
"id": "sg:person.015535116101.78",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015535116101.78"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "YanchWare, Br\u00e6dstrup, Denmark",
"id": "http://www.grid.ac/institutes/None",
"name": [
"YanchWare, Br\u00e6dstrup, Denmark"
],
"type": "Organization"
},
"familyName": "Nicolosi",
"givenName": "Angelo Agatino",
"type": "Person"
}
],
"citation": [
{
"id": "sg:pub.10.1007/s001459910006",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1010883744",
"https://doi.org/10.1007/s001459910006"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-45539-6_31",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1019622466",
"https://doi.org/10.1007/3-540-45539-6_31"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-1-4612-0851-8",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1018857135",
"https://doi.org/10.1007/978-1-4612-0851-8"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-0-387-09494-6",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1022625712",
"https://doi.org/10.1007/978-0-387-09494-6"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s001459910011",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1028805095",
"https://doi.org/10.1007/s001459910011"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-45472-1_7",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1044985982",
"https://doi.org/10.1007/3-540-45472-1_7"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-45708-9_27",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1024200446",
"https://doi.org/10.1007/3-540-45708-9_27"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-49649-1_2",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1012748271",
"https://doi.org/10.1007/3-540-49649-1_2"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-662-03642-6",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1011913013",
"https://doi.org/10.1007/978-3-662-03642-6"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s001459900030",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1004544479",
"https://doi.org/10.1007/s001459900030"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s00145-006-0347-3",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1000307063",
"https://doi.org/10.1007/s00145-006-0347-3"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/bf00196725",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1043691009",
"https://doi.org/10.1007/bf00196725"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/bf02351717",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1001094212",
"https://doi.org/10.1007/bf02351717"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-14303-8",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1046207611",
"https://doi.org/10.1007/978-3-642-14303-8"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-1-4684-0310-7",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1012143136",
"https://doi.org/10.1007/978-1-4684-0310-7"
],
"type": "CreativeWork"
}
],
"datePublished": "2018-02-05",
"datePublishedReg": "2018-02-05",
"description": "The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite with security against malicious behavior. Our second contribution is a complete Paillier (in: EUROCRYPT, pp 223\u2013238, 1999) threshold encryption scheme in the two-party setting with security against malicious attacks. We further describe how to extend our protocols to the multiparty setting with dishonest majority. Our RSA key generation protocol is comprised of the following subprotocols: (i) a distributed protocol for generation of an RSA composite and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite for the public key and is comprised of the following subprotocols: (i) a distributed generation of the corresponding secret key shares and (ii) a distributed decryption protocol for decrypting according to Paillier.",
"genre": "article",
"id": "sg:pub.10.1007/s00145-017-9275-7",
"inLanguage": "en",
"isAccessibleForFree": true,
"isPartOf": [
{
"id": "sg:journal.1136278",
"issn": [
"0933-2790",
"1432-1378"
],
"name": "Journal of Cryptology",
"publisher": "Springer Nature",
"type": "Periodical"
},
{
"issueNumber": "2",
"type": "PublicationIssue"
},
{
"type": "PublicationVolume",
"volumeNumber": "32"
}
],
"keywords": [
"threshold encryption scheme",
"two-party setting",
"encryption scheme",
"secret key shares",
"RSA key generation",
"key generation protocol",
"malicious behavior",
"malicious attacks",
"cryptographic protocols",
"decryption protocol",
"key shares",
"public key",
"dishonest majority",
"key generation",
"second contribution",
"generation protocol",
"Paillier",
"first contribution",
"security",
"subprotocol",
"protocol",
"scheme",
"Distributed Generation",
"multiparty",
"attacks",
"factorization",
"key",
"generation",
"setting",
"contribution",
"manner",
"share",
"validity",
"behavior",
"test",
"majority",
"problem",
"composites"
],
"name": "Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting",
"pagination": "265-323",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1100836157"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/s00145-017-9275-7"
]
}
],
"sameAs": [
"https://doi.org/10.1007/s00145-017-9275-7",
"https://app.dimensions.ai/details/publication/pub.1100836157"
],
"sdDataset": "articles",
"sdDatePublished": "2022-05-20T07:33",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/article/article_754.jsonl",
"type": "ScholarlyArticle",
"url": "https://doi.org/10.1007/s00145-017-9275-7"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s00145-017-9275-7'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s00145-017-9275-7'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s00145-017-9275-7'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s00145-017-9275-7'
This table displays all metadata directly associated to this object as RDF triples.
194 TRIPLES
22 PREDICATES
78 URIs
55 LITERALS
6 BLANK NODES