词条 | Distributed key generation |
释义 |
Distributed Key Generation is commonly used to decrypt shared ciphertexts or create group digital signatures.[2] HistoryDistributed key generation protocol was first specified by Torben Pedersen in 1991. This first model depended on the security of the Joint-Feldman Protocol for verifiable secret sharing during the secret sharing process.[1] In 1999, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, and Tal Rabin produced a series of security proofs demonstrating that Feldman verifiable secret sharing was vulnerable to malicious contributions to Pedersen's distributed key generator that would leak information about the shared private key.[2] The same group also proposed an updated distributed key generation scheme preventing malicious contributions from impacting the value of the private key. MethodsThe distributed key generation protocol specified by Gennaro, Jarecki, Krawczyk, and Rabin assumes that a group of players has already been established by an honest party prior to the key generation. It also assumes the communication between parties is synchronous.[2]
RobustnessIn many circumstances, a robust distributed key generator is necessary. Robust generator protocols can reconstruct public keys in order to remove malicious shares even if malicious parties still remain in the qualified group during the reconstruction phase.[2] For example, robust multi-party digital signatures can tolerate a number of malicious users roughly proportionate to the length of the modulus used during key generation.[3] Sparse Evaluated DKGDistributed key generators can implement a sparse evaluation matrix in order to improve efficiency during verification stages. Sparse evaluation can improve run time from (where is the number of parties and is the threshold of malicious users) to . Instead of robust verification, sparse evaluation requires that a small set of the parties verify a small, randomly picked set of shares. This results in a small probability that the key generation will fail in the case that a large number of malicious shares are not chosen for verification.[4] ApplicationsDistributed key generation and distributed key cryptography are rarely applied over the internet because of the reliance on synchronous communication.[2] Distributed key cryptography is useful in key escrow services where a company can meet a threshold to decrypt a ciphertext version of private key. This way a company can require multiple employees to recover a private key without giving the escrow service a plaintext copy.[5] Distributed key generation is also useful in server-side password authentication. If password hashes are stored on a single server, a breach in the server would result in all the password hashes being available for attackers to analyze offline. Variations of distributed key generation can authenticate user passwords across multiple servers and eliminate single points of failure.[6][7] Distributed key generation is more commonly used for group digital signatures. This acts as a form of voting, where a threshold of group members would have to participate in order for the group to digitally sign a document.[8] References1. ^{{Cite book | last1 = Pedersen | first1 = T. P. | chapter = Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing | doi = 10.1007/3-540-46766-1_9 | title = Advances in Cryptology — CRYPTO '91 | series = Lecture Notes in Computer Science | volume = 576 | pages = 129–140 | year = 1992 | isbn = 978-3-540-55188-1 | pmid = | pmc = }} {{Cryptography navbox | public-key}}2. ^1 2 3 4 {{cite journal|last1=Gennaro|first1=Rosario|last2=Jarecki|first2=Stanislaw|last3=Krawczyk|first3=Hugo|last4=Rabin|first4=Tal|title=Secure Distributed Key Generation for Discrete-Log Based Cryptosystems|journal=Journal of Cryptology|date=24 May 2006|volume=20|issue=1|pages=51–83|doi=10.1007/s00145-006-0347-3|citeseerx=10.1.1.134.6445}} 3. ^{{cite journal|last1=Castelluccia|first1=Claude|last2=Jarecki|first2=Stanisław|last3=Kim|first3=Jihye|last4=Tsudik|first4=Gene|title=Secure acknowledgment aggregation and multisignatures with limited robustness|journal=Computer Networks|volume=50|issue=10|pages=1639–1652|doi=10.1016/j.comnet.2005.09.021|year=2006}} 4. ^{{cite book|last1=Canny|first1=John|last2=Sorkin|first2=Steve|title=Practical Large-scale Distributed Key Generation|journal=Advances in Cryptography - EUROCRYPT 2004|volume=3027|date=2004|pages=138–152|doi=10.1007/978-3-540-24676-3_9|url=http://www.cs.berkeley.edu/~jfc/papers/04/Eurocrypt/Eurocrypt04.pdf|series=Lecture Notes in Computer Science|isbn=978-3-540-21935-4|citeseerx=10.1.1.69.6028}} 5. ^1 2 {{cite book|last1=Kate|first1=Aniket|last2=Goldberg|first2=Ian|title=Distributed Private-Key Generators for Identity Based Cryptography|journal=Security and Cryptography for Networks|volume=6280|date=2010|pages=436–453|doi=10.1007/978-3-642-15317-4_27|series=Lecture Notes in Computer Science|isbn=978-3-642-15316-7|citeseerx=10.1.1.389.4486}} 6. ^{{cite journal|last1=MacKenzie|first1=Philip|last2=Shrimpton|first2=Thomas|last3=Marcus|first3=Jakobsson|title=Threshold Password-authenticated Key Exchange|journal=Journal of Cryptology|date=2006|volume=19|issue=1|pages=27–66|doi=10.1007/s00145-005-0232-5|citeseerx=10.1.1.101.6403}} 7. ^{{cite journal|last1=Jarecki|first1=Stanislaw|last2=Kiayias|first2=Aggelos|last3=Krawczyk|first3=Hugo|title=Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only model|journal=Cryptology ePrint Archive|date=2014|volume=650|url=https://eprint.iacr.org/2014/650.pdf|accessdate=5 November 2014}} 8. ^1 2 {{cite book|last1=Boldyreva|first1=Alexandra|title=Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme|journal=Public Key Cryptography|volume=2567|date=2003|pages=31–46|doi=10.1007/3-540-36288-6_3|url=http://iacr.org/archive/pkc2003/25670031/25670031.pdf|series=Lecture Notes in Computer Science|isbn=978-3-540-00324-3}} 1 : Public-key cryptography |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。