• Corpus ID: 17131194

Revisiting the Distributed Key Generation for Discrete-Log Based Cryptosystems

@inproceedings{Gennaro2007RevisitingTD,
  title={Revisiting the Distributed Key Generation for Discrete-Log Based Cryptosystems},
  author={Rosario Gennaro and Stanislaw Jarecki and Hugo Krawczyk},
  year={2007}
}
A Distributed Key Generation (DKG) protocol is an essential component of any threshold cryptosystem. It is used to initialize the cryptosystem and generate its private and public keys, and it is used as a subprotocol, for example to generate a one-time key pair which is a part of any threshold El-Gamal-like signature scheme. Gennaro et al. showed [GJKR99] that a widely-known non-interactive DKG protocol suggested by Pedersen does not guarantee a uniformly random distribution of generated secret… 

Figures from this paper

Secure Distributed Key Generation for Discrete-Log Based Cryptosystems

This paper shows that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random distribution of generated keys, and presents a new protocol which proves to satisfy the security requirements from DKG protocols and ensures a uniform distribution of the generated keys.

Distributed key generation protocol with hierarchical threshold access structure

This study considers the problem of DKG in groups with hierarchical structure where the authorised subsets can be defined by a hierarchical threshold access structure and proposes a verifiable hierarchical threshold secret sharing protocol that satisfies all the security requirements.

Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices

A threshold signature scheme based on Pedersen distributed key generation principle which is suitable for handheld devices and ad-hoc networks is proposed and the signature can be generated and verified efficiently.

Secure Distributed Key Generation on Vector Space Access Structures in Bilinear Groups

  • Jie ZhangFutai Zhang
  • Computer Science, Mathematics
    2013 5th International Conference on Intelligent Networking and Collaborative Systems
  • 2013
This paper focuses on secure distributed key generation in bilinear groups and proposes such protocol on vector space access structures and gives detailed proof for its security.

ETHDKG: Distributed Key Generation with Ethereum Smart Contracts

This paper aims to close the gap between fully functional and readily available DKG protocol implementations by tailoring Gennaro et al.

Efficient Verifiable Secret Sharing Scheme over Bilinear Groups

This work focuses on verifiably sharing of a secret that is an element of a bilinear group and introduces strict security definitions for such a noninteractive VSS scheme, and comes up with an efficient V SS scheme for sharing a secret in a bilInear group.

Distributed Key Generation with Smart Contracts using zk-SNARKs

A DKG protocol that uses smart contracts to ensure the correct execution of the protocol, allow dynamic participation, and provide crypto-economic incentives to encourage honest behavior is proposed.

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism

Results from the security analysis have shown that the proposed consensus algorithm ensures forks cannot occur, and it remains secure and consistent even amid numerous attacks, solving the issue of scalability.

A Proactive Secret Sharing for Server Assisted Threshold Signatures

A proactive secret sharing schemes which are suitable for server-assisted threshold signatures, and a general construction to build threshold signature schemes which provide an organization with controllability for activating his private signing function in a certain enhanced way.

Improved topology assumptions for threshold cryptography in mobile ad hoc networks

This paper presents a new MANET threshold signature scheme that is secure under significantly improved topology assumptions and breaks through an apparent barrier due to well-known results from the Distributed Computing area.

Secure Distributed Key Generation for Discrete-Log Based Cryptosystems

This paper shows that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random distribution of generated keys, and presents a new protocol which proves to satisfy the security requirements from DKG protocols and ensures a uniform distribution of the generated keys.

Efficient threshold cryptosystems

This work shows that threshold schemes can be constructed by putting together several simple distributed protocols that implement arithmetic operations, like multiplication or exponentiation, in a threshold setting, and exemplifies this approach with two discrete-log based threshold schemes, a threshold DSS signature scheme and a threshold Cramer-Shoup cryptosystem.

An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack

This paper proposes a simple threshold Public-Key Cryptosystem (PKC) which is secure against adaptive chosen ciphertext attack, under the Decisional Diffie-Hellman (DDH) intractability assumption.

Adaptively secure distributed public-key systems

Simplified VSS and fast-track multiparty computations with applications to threshold cryptography

A very simple Verifiable Secret Sharing protocol is presented which is based on fast cryptographic primitives and avoids altogether the need for expensive zero-knowledge proofs and a highly simplified protocol to compute multiplications over shared secrets.

Adaptive Security for Threshold Cryptosystems

We present adaptively-secure efficient solutions to several central problems in the area of threshold cryptography. We prove these solutions to withstand adaptive attackers that choose parties for

Secure INtrusion-Tolerant Replication on the Internet

  • C. CachinJ. Poritz
  • Computer Science
    Proceedings International Conference on Dependable Systems and Networks
  • 2002
The implementation of SINTRA in Java is described and timing measurements are given for a test-bed of servers distributed over three continents, showing that extensive use of public-key cryptography does not impose a large overhead for secure coordination in wide-area networks.

A Threshold Cryptosystem without a Trusted Party (Extended Abstract)

In a threshold cryptosystem n members share the necret key of an organization such that k members (1 5 k 5 n) must cooperate in order to decipher a given uphertext. In this note it is shown how to

A practical scheme for non-interactive verifiable secret sharing

  • Paul Feldman
  • Computer Science
    28th Annual Symposium on Foundations of Computer Science (sfcs 1987)
  • 1987
This paper presents an extremely efficient, non-interactive protocol for verifiable secret sharing, which provides asynchronous networks with a constant-round simulation of simultaneous broadcast networks whenever even a bare majority of processors are good.

Proactive public key and signature systems

Emerging applications like electronic commerce and secure communications over open networks have made clear the fundamental role of public key cryptography as a unique enabler for world-wide scale