# Secure Distributed Key Generation for Discrete-Log Based Cryptosystems

@article{Gennaro2006SecureDK, title={Secure Distributed Key Generation for Discrete-Log Based Cryptosystems}, author={Rosario Gennaro and Stanislaw Jarecki and Hugo Krawczyk and Tal Rabin}, journal={Journal of Cryptology}, year={2006}, volume={20}, pages={51-83} }

A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosystems required to initialize the cryptosystem securely and generate its private and public keys. In the case of discrete-log-based (dlog-based) threshold signature schemes (ElGamal and its derivatives), the DKG protocol is further used in the distributed signature generation phase to generate one-time signature randomizers (r = gk). In this paper we show that a widely used dlog-based DKG protocol…

## 558 Citations

Design Efficient Distributed Key Generation For Secure Network Applications over Cloud

- Computer Science, Mathematics
- 2016

The HTDKG protocol is developed for secure in front of adaptive attackers through presenting the attacker model as well as communication model and is additionally proposed for the decrease the processing time and enhances the memory utilization by utilizing of KDC.

Distributed key generation protocol with a new complaint management strategy

- Computer Science, MathematicsSecur. Commun. Networks
- 2016

An extended version of Joint-Feldman DKG that ensures a uniform distribution of the generated keys and a DKG protocol with public channels that use a new strategy to manage complaints without revealing the shares of the secrets held by honest participants and that clearly identifies dishonest participants are presented.

Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.

- Computer Science, MathematicsCCS
- 2020

In this paper, we present the first Asynchronous Distributed Key Generation (ADKG) algorithm which is also the first distributed key generation algorithm that can generate cryptographic keys with a…

Distributed protocols for digital signatures and public key encryption

- Computer Science, Mathematics
- 2016

This thesis proposes the first generic construction of distributed verifiable random functions (DVRF) that do not impose assumptions on trusted generation of secret keys and whose outputs remain pseudorandom even in a presence of up to n − 1 corrupted servers.

Practical Asynchronous Distributed Key Generation

- Computer ScienceIACR Cryptol. ePrint Arch.
- 2021

The proposed ADKG protocol produces a field element as the secret and is thus compatible with off-the-shelf threshold cryptosystems, and can tolerate up to t < n/3 malicious nodes and have an expected O(κn) communication cost.

Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices

- Computer Science, MathematicsFirst International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
- 2005

A threshold signature scheme based on Pedersen distributed key generation principle which is suitable for handheld devices and ad-hoc networks is proposed and the signature can be generated and verified efficiently.

Threshold and Revocation Cryptosystems via Extractable Hash Proofs

- Computer Science, MathematicsEUROCRYPT
- 2011

We present a new unifying framework for constructing noninteractive threshold encryption and signature schemes, as well as broadcast encryption schemes, and in particular, derive several new…

Distributed key generation protocol with hierarchical threshold access structure

- Computer Science, MathematicsIET Inf. Secur.
- 2015

This study considers the problem of DKG in groups with hierarchical structure where the authorised subsets can be defined by a hierarchical threshold access structure and proposes a verifiable hierarchical threshold secret sharing protocol that satisfies all the security requirements.

Distributed Key Generation in the Wild

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2012

This work proposes a practical system model for the Internet and defines an efficient verifiable secret sharing (VSS) scheme in it and designs a provably secure DKG protocol, which is implemented and establishes its efficiency and reliability by extensively testing it on the PlanetLab platform.

Aggregatable Distributed Key Generation

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2021

This paper introduces a distributed key generation (DKG) protocol with aggregatable and publicly-verifiable transcripts and proves the security of the aggregatable DKG as well as that of several existing DKGs, including the popular Pedersen variant.

## References

SHOWING 1-10 OF 47 REFERENCES

Revisiting the Distributed Key Generation for Discrete-Log Based Cryptosystems

- Computer Science, Mathematics
- 2007

The question whether some discrete-log based threshold cryptosystems remain secure when implemented using the more efficient DKG protocol of Pedersen, in spite of the fact that the adversary can skew the distribution of the secret key generated by this protocol is investigated.

Secure Distributed Key Generation for Discrete-Log Based Cryptosystems

- Computer Science, MathematicsEUROCRYPT
- 1999

A distributed key generation protocol, that achieves optimal resiliency, can be used as a drop-in replacement for key generation modules as well as other components of threshold or proactive discrete-log based cryptosystems.

Adaptive Security for Threshold Cryptosystems

- Computer Science, MathematicsCRYPTO
- 1999

We present adaptively-secure efficient solutions to several central problems in the area of threshold cryptography. We prove these solutions to withstand adaptive attackers that choose parties for…

Weakness in Some Threshold Cryptosystems

- Computer Science, MathematicsCRYPTO
- 1996

It is shown that the n-out-of-n threshold undeniable signature scheme has an actual security of only 2-out of-n, and the discrete log based threshold signature schemes have a weakness in the key generation protocol.

Optimal-resilience proactive public-key cryptosystems

- Computer Science, MathematicsProceedings 38th Annual Symposium on Foundations of Computer Science
- 1997

A threshold function sharing scheme with proactive security for general functions with a "homomorphic property" (a class which includes all RSA variants and Discrete logarithm variants) and enables computation of the function by the servers assuring high availability, security and efficiency.

Adaptively secure distributed public-key systems

- Computer Science, MathematicsTheor. Comput. Sci.
- 2002

Efficient signature generation by smart cards

- Computer Science, MathematicsJournal of Cryptology
- 2004

An efficient algorithm that preprocesses the exponentiation of a random residue modulo p is presented, which improves the ElGamal signature scheme in the speed of the procedures for the generation and the verification of signatures and also in the bit length of signatures.

Proactive public key and signature systems

- Computer Science, MathematicsCCS '97
- 1997

Emerging applications like electronic commerce and secure communications over open networks have made clear the fundamental role of public key cryptography as a unique enabler for world-wide scale…

Secure INtrusion-Tolerant Replication on the Internet

- Computer ScienceProceedings International Conference on Dependable Systems and Networks
- 2002

The implementation of SINTRA in Java is described and timing measurements are given for a test-bed of servers distributed over three continents, showing that extensive use of public-key cryptography does not impose a large overhead for secure coordination in wide-area networks.

A Threshold Cryptosystem without a Trusted Party (Extended Abstract)

- Computer Science, MathematicsEUROCRYPT
- 1991

In a threshold cryptosystem n members share the necret key of an organization such that k members (1 5 k 5 n) must cooperate in order to decipher a given uphertext. In this note it is shown how to…