阈值_取消

ID:32535

大小:0.13 MB

页数:20页

时间:2023-01-29

金币:5

上传者:战必胜
Threshold and Revocation Cryptosystems
via Extractable Hash Proofs
Hoeteck Wee
Queens College, CUNY
hoeteck@cs.qc.cuny.edu
Abstract. We present a new unifying framework for constructing non-interactive
threshold encryption and signature schemes, as well as broadcast encryption
schemes, and in particular, derive several new cryptosystems based on hardness
of factoring, including:
a threshold signature scheme (in the random oracle model) that supports
ad-hoc groups (i.e., exponential number of identities and the set-up is
independent of the total number of parties) and implements the standard
Rabin signature;
a threshold encryption scheme that supports ad-hoc groups, where encryp-
tion is the same as that in the Blum-Goldwasser cryptosystem and therefore
more efficient than RSA-based implementations;
a CCA-secure threshold encryption scheme in the random oracle model;
a broadcast encryption scheme (more precisely, a revocation cryptosystem)
that supports ad-hoc groups, whose complexity is comparable to that of the
Naor-Pinkas scheme; moreover, we provide a variant of the construction that
is CCA-secure in the random oracle model.
Our framework rests on a new notion of threshold extractable hash proofs. The
latter can be viewed as a generalization of the extractable hash proofs, which are
a special kind of non-interactive zero-knowledge proof of knowledge.
1 Introduction
As the old saying goes, “Do not put all your eggs in one basket”. Indeed, this
is the basic principle underlying threshold cryptography, which distributes some
cryptographic functionality amongst many users in such a way that: (1) any t + 1
parties can collectively compute the functionality; and (2) no colluding subset of t
parties can compromise the security of the functionality. The two canonical applications
of threshold cryptography are in public-key encryption and signature schemes, where
the functionalities in consideration correspond to decryption and signing respectively.
The approach was initiated in [19, 20, 21], and there is now a large body of work on
threshold signature schemes [18, 27, 40, 26, 28, 29, 8, 34, 30] and threshold encryption
schemes [41, 11, 24, 34, 9, 10].
Supported by NSF CAREER Award CNS-0953626, and the US Army Research laboratory
and the UK Ministry of Defence under agreement number W911NF-06-3-0001.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭