Loading...
Please wait, while we are loading the content...
Similar Documents
Efficient RSA key generation and threshold Paillier in the two-party setting (2012)
| Content Provider | CiteSeerX |
|---|---|
| Author | Hazay, Carmit Læssøe, Gert Toft, Rabin Tomas Nicolosi, Angelo Agatino |
| Description | The problem of generating an RSA composite in a distributed manner without leaking its factoriza-tion is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite with security against malicious behavior. Our second contribution is a complete Paillier [Pai99] threshold encryption scheme in the two-party setting with security against malicious attacks. We further describe how to extend our protocols to the multiparty setting with dishonest majority. Our RSA key generation protocol is comprised of the following sub-protocols: (i) a distributed protocol for generation of an RSA composite, and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite for the public-key and is comprised of the following sub-protocols: (i) a distributed generation of the corresponding secret-key shares and, (ii) a distributed decryption protocol for decrypting according to Paillier. |
| File Format | |
| Language | English |
| Publisher Date | 2012-01-01 |
| Publisher Institution | In Proc. of the 12th Conf. on Topics in Cryptology, CT-RSA |
| Access Restriction | Open |
| Subject Keyword | First Contribution Distributed Manner Paillier Threshold Encryption Scheme Simulatable Protocol Malicious Attack Complete Paillier Pai99 Two-party Setting Distributed Generation Encryption Scheme Rsa Key Generation Protocol Efficient Rsa Key Generation Biprimality Test Generated Composite Distributed Decryption Protocol Second Contribution Following Sub-protocols Many Cryptographic Protocol Malicious Behavior Corresponding Secret-key Share Dishonest Majority Rsa Composite Threshold Paillier |
| Content Type | Text |
| Resource Type | Article |