DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER

Apostolos P. Fournaris

2011

Abstract

Threshold cryptography offers an elegant approach in evenly sharing certificate responsibilities to all participants of a distributed system through Shamir’s secret sharing scheme, where a secret (the Certificate Authority’s (CA) private key) is split and shared among all participants. However, existing threshold cryptography distributed key generation and certification systems still rely on a single, centralized, trusted entity at some point during the certification process (usually during initialization) to split the secret and distribute it to all distributed system participants. This centralized entity, denoted as trusted dealer, can cancel participant equality and can become a single point of failure. In this paper, we deal with this problem by extending the a key generation scheme of Noack and Spitz (2009) and by proposing a certification scheme that has no need for a trusted dealer to create, split and distribute the proposed certification scheme’s private-public key pair. The proposed scheme uses the participant addition-removal procedure described in (Noack and Spitz, 2009) that does not affect the scheme’s public key (used for certificate verification) and has small interference to the certification process as a whole. To reduce the computational cost the proposed system employs Elliptic Curve Cryptography (ECC) principles.

References

  1. Shamir, A. auth., 1979. How to share a secret. Communications of the ACM, 22, s.612-613.
  2. Shamir, A. auth., 1979. How to share a secret. Communications of the ACM, 22, s.612-613.
  3. Desmedt, Y& Frankel Y., 1989: Threshold Cryptosystems. CRYPTO 1989:307-315
  4. Desmedt, Y& Frankel Y., 1989: Threshold Cryptosystems. CRYPTO 1989:307-315
  5. Frankel, Y. et al. auth., 1997. Optimal-resilience proactive public-key cryptosystems. Proceedings of the 38th Annual Symposium on Foundations of Computer Science, pp.384-.
  6. Frankel, Y. et al. auth., 1997. Optimal-resilience proactive public-key cryptosystems. Proceedings of the 38th Annual Symposium on Foundations of Computer Science, pp.384-.
  7. Pedersen, 1991: A Threshold cryptosystem without a trusted third party, proc. of EuroCrypt 91, Springer Verlag LNCS nr. 547.
  8. Pedersen, 1991: A Threshold cryptosystem without a trusted third party, proc. of EuroCrypt 91, Springer Verlag LNCS nr. 547.
  9. Shoup, V. auth., Practical threshold signatures. , 1807 pages, pp.207-220.
  10. Shoup, V. auth., Practical threshold signatures. , 1807 pages, pp.207-220.
  11. Damgård, I. & Koprowski, M. auth., 2000. Practical Threshold RSA Signatures Without a Trusted Dealer. , pp.152-165.
  12. Damgård, I. & Koprowski, M. auth., 2000. Practical Threshold RSA Signatures Without a Trusted Dealer. , pp.152-165.
  13. Andreas Noack, Stefan Spitz, 2009, Dynamic Threshold Cryptosystem without Group Manager Network Protocols and Algorithms 1: 1. pp 108-121
  14. Andreas Noack, Stefan Spitz, 2009, Dynamic Threshold Cryptosystem without Group Manager Network Protocols and Algorithms 1: 1. pp 108-121
  15. Crépeau, C. & Davis, C. R. auth., 2003. A certificate revocation scheme for wireless ad hoc networks. in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. SASN 7803. New York, NY, USA: ACM, pp 54-61.
  16. Crépeau, C. & Davis, C. R. auth., 2003. A certificate revocation scheme for wireless ad hoc networks. in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. SASN 7803. New York, NY, USA: ACM, pp 54-61.
  17. Arboit, G. et al. auth., 2008. A localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Networks, 6, pp.17-31.
  18. Arboit, G. et al. auth., 2008. A localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Networks, 6, pp.17-31.
  19. Kyul Park et al. auth., 2010. Certificate Revocation to Cope with False Accusations in Mobile Ad Hoc Networks. in Vehicular Technology Conference (VTC 2010-Spring), 2010 IEEE 71st. Vehicular Technology Conference (VTC 2010-Spring),. pp 1-5.
  20. Kyul Park et al. auth., 2010. Certificate Revocation to Cope with False Accusations in Mobile Ad Hoc Networks. in Vehicular Technology Conference (VTC 2010-Spring), 2010 IEEE 71st. Vehicular Technology Conference (VTC 2010-Spring),. pp 1-5.
  21. Herzberg, A. et al. et al., 1995. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. Lecture Notes in Computer Science, 963:339, pp.339--352.
  22. Herzberg, A. et al. et al., 1995. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. Lecture Notes in Computer Science, 963:339, pp.339--352.
Download


Paper Citation


in Harvard Style

P. Fournaris A. (2011). DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 400-404. DOI: 10.5220/0003525304000404


in Harvard Style

P. Fournaris A. (2011). DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 400-404. DOI: 10.5220/0003525304000404


in Bibtex Style

@conference{secrypt11,
author={Apostolos P. Fournaris},
title={DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={400-404},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003525304000404},
isbn={978-989-8425-71-3},
}


in Bibtex Style

@conference{secrypt11,
author={Apostolos P. Fournaris},
title={DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={400-404},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003525304000404},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER
SN - 978-989-8425-71-3
AU - P. Fournaris A.
PY - 2011
SP - 400
EP - 404
DO - 10.5220/0003525304000404


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER
SN - 978-989-8425-71-3
AU - P. Fournaris A.
PY - 2011
SP - 400
EP - 404
DO - 10.5220/0003525304000404