期刊文献+

Efficient and Robust Two-Party RSA Key Generation

Efficient and Robust Two-Party RSA Key Generation
下载PDF
导出
摘要 An efficient two party RSA secret key sharing generation scheme based on a homomorphic encryption, which is semantically secure under the prime residuosity assumption, is proposed in this paper. At the stage of computing RSA modulo N, an initial distributed primality test protocol is used to reduce the computation complexity and increase the probability of N being a two-prime product. On the other aspect, the homomorphic encryption based sharing conversion protocols is devised and adopted in multi-party computing modulus N and secret key d. Comparing to any sharing conversion protocols based on oblivious transfer protocol, the homomorphic encryption based sharing conversion protocols are of high performance. Our scheme resists the passive attack and since a method of verifying the sharing was introduced in, the scheme can resists any cheating behaviors too. Security proof, computation complexity and communication complexity analysis are given at last. An efficient two party RSA secret key sharing generation scheme based on a homomorphic encryption, which is semantically secure under the prime residuosity assumption, is proposed in this paper. At the stage of computing RSA modulo N, an initial distributed primality test protocol is used to reduce the computation complexity and increase the probability of N being a two-prime product. On the other aspect, the homomorphic encryption based sharing conversion protocols is devised and adopted in multi-party computing modulus N and secret key d. Comparing to any sharing conversion protocols based on oblivious transfer protocol, the homomorphic encryption based sharing conversion protocols are of high performance. Our scheme resists the passive attack and since a method of verifying the sharing was introduced in, the scheme can resists any cheating behaviors too. Security proof, computation complexity and communication complexity analysis are given at last.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1617-1620,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of China (60403027)
关键词 RSA key generation multi-party computation threshold cryptography RSA key generation multi-party computation threshold cryptography
  • 相关文献

参考文献11

  • 1王宏,肖鸿,肖国镇.防欺诈的二方共享RSA密钥[J].软件学报,2000,11(10):1344-1347. 被引量:6
  • 2Shamir A.How to share a secret[].Communications of the ACM.1979
  • 3Desmedt Y.Threshold cryptography[].European Transactions on Telecommuni cations.1994
  • 4Cocks,C. Split Knowledge of RSA Parameters [C]//Cryptography and Coding . 1997
  • 5Boneh D,Franklin M.Efficient generation of shared RSA keys[].Proceedings of CRYPTO‘.1997
  • 6BONEH D,FRANKLIN M.E fficient Generation of Shared RSAKeys[].Journal of the ACM.2001
  • 7Gilboa,N.Two party RSA key generation[].Proc of Crypto‘.1999
  • 8Naccache D,Stern J.A new public-key cryptosystem based on higher residues[].Proceedings of the th ACM Conference on Computer and Communications Security.1998
  • 9Der?me,M F A.Generating RSA Keys without the Euclid Algorithm[].Electronics Letters.1993
  • 10Blakley G R.Safeguarding Cryptographic Keys[].Proceed- ings of AFIPSNational Computer Conference.1979

二级参考文献13

  • 11,Shamir A. How to share a secret. Communications of the ACM, 197 9,22(11):612~613
  • 22,Desmedt Y. Threshold cryptography. European Transactions on Telecommuni cations, 1994,5(4):449~457
  • 33,Desantis A, Desmedt Y, Frankel Y et al. How to share a function sec urely. In: Proceedings of the 26th Annual ACM Symposium Theory of Computing (STO C). New York: ACM Press, 1994. 522~533
  • 44,Boneh D, Franklin M. Efficient generation of shared RSA keys. In: Burto n S, Kaliski J eds. Proceedings of the Crypto'97. Berlin: Springer-Verlag, 1997 . 425~439
  • 55,Cocks C. Split knowledge generation of RSA parameters. In: Darnell M ed . Cryptography and Coding: the 6th IMA International Conference. Berlin: Springe r-Verlag, 1997. 89~95
  • 66,Gilboa N. Two party RSA key generation. In: Wiener M ed. Proceedings of the Crypto'99. Berlin: Springer-Verlag, 1999. 116~129
  • 77,Bellare M, Micali S. Non-Interactive oblivious transfer and applicati ons. In: Brassard G ed. Proceedings of the Crypto'89. Berlin: Springer-Verlag, 1989. 547~557
  • 88,Naor M, Pinkas B. Oblivious transfer and polynomial evaluation. In: Pr oceedings of the 31st STOC. New York: ACM Press, 1999
  • 99,Goldreich O, Micali S, Wigderson A. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM, 1991,38(1):691~729
  • 1010,Benaloh J. Dense probabilistic encryption. In: Proceedings of the Workshop o n Selected Areas of Cryptography. Berlin: Springer-Verlag, 1994. 120~128

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部