Revisiting the Distributed Key Generation for Discrete-Log Based Cryptosystems
@inproceedings{Gennaro2007RevisitingTD, title={Revisiting the Distributed Key Generation for Discrete-Log Based Cryptosystems}, author={Rosario Gennaro and Stanislaw Jarecki and Hugo Krawczyk}, year={2007} }
A Distributed Key Generation (DKG) protocol is an essential component of any threshold cryptosystem. It is used to initialize the cryptosystem and generate its private and public keys, and it is used as a subprotocol, for example to generate a one-time key pair which is a part of any threshold El-Gamal-like signature scheme. Gennaro et al. showed [GJKR99] that a widely-known non-interactive DKG protocol suggested by Pedersen does not guarantee a uniformly random distribution of generated secret…
No Paper Link Available
20 Citations
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
- Computer Science, MathematicsJournal of Cryptology
- 2006
This paper shows that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random distribution of generated keys, and presents a new protocol which proves to satisfy the security requirements from DKG protocols and ensures a uniform distribution of the generated keys.
Distributed key generation protocol with hierarchical threshold access structure
- Computer Science, MathematicsIET Inf. Secur.
- 2015
This study considers the problem of DKG in groups with hierarchical structure where the authorised subsets can be defined by a hierarchical threshold access structure and proposes a verifiable hierarchical threshold secret sharing protocol that satisfies all the security requirements.
Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices
- Computer Science, MathematicsFirst International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
- 2005
A threshold signature scheme based on Pedersen distributed key generation principle which is suitable for handheld devices and ad-hoc networks is proposed and the signature can be generated and verified efficiently.
Secure Distributed Key Generation on Vector Space Access Structures in Bilinear Groups
- Computer Science, Mathematics2013 5th International Conference on Intelligent Networking and Collaborative Systems
- 2013
This paper focuses on secure distributed key generation in bilinear groups and proposes such protocol on vector space access structures and gives detailed proof for its security.
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2019
This paper aims to close the gap between fully functional and readily available DKG protocol implementations by tailoring Gennaro et al.
Efficient Verifiable Secret Sharing Scheme over Bilinear Groups
- Computer Science, Mathematics
- 2012
This work focuses on verifiably sharing of a secret that is an element of a bilinear group and introduces strict security definitions for such a noninteractive VSS scheme, and comes up with an efficient V SS scheme for sharing a secret in a bilInear group.
Distributed Key Generation with Smart Contracts using zk-SNARKs
- Computer Science, MathematicsArXiv
- 2022
A DKG protocol that uses smart contracts to ensure the correct execution of the protocol, allow dynamic participation, and provide crypto-economic incentives to encourage honest behavior is proposed.
PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism
- Computer ScienceICVISP
- 2020
Results from the security analysis have shown that the proposed consensus algorithm ensures forks cannot occur, and it remains secure and consistent even amid numerous attacks, solving the issue of scalability.
A Proactive Secret Sharing for Server Assisted Threshold Signatures
- Computer Science, MathematicsHPCC
- 2006
A proactive secret sharing schemes which are suitable for server-assisted threshold signatures, and a general construction to build threshold signature schemes which provide an organization with controllability for activating his private signing function in a certain enhanced way.
Improved topology assumptions for threshold cryptography in mobile ad hoc networks
- Computer Science, MathematicsSASN '05
- 2005
This paper presents a new MANET threshold signature scheme that is secure under significantly improved topology assumptions and breaks through an apparent barrier due to well-known results from the Distributed Computing area.
32 References
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
- Computer Science, MathematicsJournal of Cryptology
- 2006
This paper shows that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random distribution of generated keys, and presents a new protocol which proves to satisfy the security requirements from DKG protocols and ensures a uniform distribution of the generated keys.
Efficient threshold cryptosystems
- Computer Science, Mathematics
- 2001
This work shows that threshold schemes can be constructed by putting together several simple distributed protocols that implement arithmetic operations, like multiplication or exponentiation, in a threshold setting, and exemplifies this approach with two discrete-log based threshold schemes, a threshold DSS signature scheme and a threshold Cramer-Shoup cryptosystem.
An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack
- Computer Science, MathematicsEUROCRYPT
- 1999
This paper proposes a simple threshold Public-Key Cryptosystem (PKC) which is secure against adaptive chosen ciphertext attack, under the Decisional Diffie-Hellman (DDH) intractability assumption.…
Adaptively secure distributed public-key systems
- Computer Science, MathematicsTheor. Comput. Sci.
- 2002
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
- Computer Science, MathematicsPODC '98
- 1998
A very simple Verifiable Secret Sharing protocol is presented which is based on fast cryptographic primitives and avoids altogether the need for expensive zero-knowledge proofs and a highly simplified protocol to compute multiplications over shared secrets.
Adaptive Security for Threshold Cryptosystems
- Computer Science, MathematicsCRYPTO
- 1999
We present adaptively-secure efficient solutions to several central problems in the area of threshold cryptography. We prove these solutions to withstand adaptive attackers that choose parties for…
Secure INtrusion-Tolerant Replication on the Internet
- Computer ScienceProceedings International Conference on Dependable Systems and Networks
- 2002
The implementation of SINTRA in Java is described and timing measurements are given for a test-bed of servers distributed over three continents, showing that extensive use of public-key cryptography does not impose a large overhead for secure coordination in wide-area networks.
A Threshold Cryptosystem without a Trusted Party (Extended Abstract)
- Computer Science, MathematicsEUROCRYPT
- 1991
In a threshold cryptosystem n members share the necret key of an organization such that k members (1 5 k 5 n) must cooperate in order to decipher a given uphertext. In this note it is shown how to…
A practical scheme for non-interactive verifiable secret sharing
- Computer Science28th Annual Symposium on Foundations of Computer Science (sfcs 1987)
- 1987
This paper presents an extremely efficient, non-interactive protocol for verifiable secret sharing, which provides asynchronous networks with a constant-round simulation of simultaneous broadcast networks whenever even a bare majority of processors are good.
Proactive public key and signature systems
- Computer Science, MathematicsCCS '97
- 1997
Emerging applications like electronic commerce and secure communications over open networks have made clear the fundamental role of public key cryptography as a unique enabler for world-wide scale…