loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Author: Apostolos P. Fournaris

Affiliation: University of Patras, Greece

Keyword(s): Threshold Cryptography, Elliptic Curve Cryptography, Distributed system, Certificate Authority.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Security in Distributed Systems ; Security in Information Systems ; Security Information Systems Architecture and Design and Security Patterns

Abstract: Threshold cryptography offers an elegant approach in evenly sharing certificate responsibilities to all participants of a distributed system through Shamir’s secret sharing scheme, where a secret (the Certificate Authority’s (CA) private key) is split and shared among all participants. However, existing threshold cryptography distributed key generation and certification systems still rely on a single, centralized, trusted entity at some point during the certification process (usually during initialization) to split the secret and distribute it to all distributed system participants. This centralized entity, denoted as trusted dealer, can cancel participant equality and can become a single point of failure. In this paper, we deal with this problem by extending the a key generation scheme of Noack and Spitz (2009) and by proposing a certification scheme that has no need for a trusted dealer to create, split and distribute the proposed certification scheme’s private-public key pair. The proposed scheme uses the participant addition-removal procedure described in (Noack and Spitz, 2009) that does not affect the scheme’s public key (used for certificate verification) and has small interference to the certification process as a whole. To reduce the computational cost the proposed system employs Elliptic Curve Cryptography (ECC) principles. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.204.142.235

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
P. Fournaris, A. (2011). DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER. In Proceedings of the International Conference on Security and Cryptography (ICETE 2011) - SECRYPT; ISBN 978-989-8425-71-3; ISSN 2184-3236, SciTePress, pages 400-404. DOI: 10.5220/0003525304000404

@conference{secrypt11,
author={Apostolos {P. Fournaris}.},
title={DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2011) - SECRYPT},
year={2011},
pages={400-404},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003525304000404},
isbn={978-989-8425-71-3},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2011) - SECRYPT
TI - DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER
SN - 978-989-8425-71-3
IS - 2184-3236
AU - P. Fournaris, A.
PY - 2011
SP - 400
EP - 404
DO - 10.5220/0003525304000404
PB - SciTePress