Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem
Hamidi, Amirreza, and Ghodosi, Hossein (2023) Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem. In: Lecture Notes in Computer Science (13809) pp. 117-132. From: SecITC 2022: 15th International Conference on Innovative Security Solutions for Information Technology and Communications, 8-9 December 2022, Virtual.
PDF (Published Version)
- Published Version
Restricted to Repository staff only |
Abstract
Paillier cryptosystem is the building block of many cryptographic protocols. The secure keys generation without a trusted dealer is an essential scheme in a distributed system since the dealer may be under the threat of a single point of attack.
We present a distributed keys generation scheme of the threshold Paillier’s encryption system using efficient multiparty computation. Our scheme consists of two offline and online phases where the offline phase can be implemented at any time well in advance of the computation phase. Both the public and the private keys are computed and verified in the presence of at least t+1 participants in the actual online phase. This gives an improvement on the previous studies where at least a number of 2t+1 parties are required for the keys generation. Furthermore, the private communication complexity of our scheme is O(n^2) field elements with no broadcast communication overhead which improves on the total communication complexity of [21]. Our protocol maintains the security against a static active adversary corrupting up to t participants with the small probability of error using message authentication codes. Also, the computed keys are t-private, i.e., any subset of equal or less than t parties cannot gain any information about the factorization of N.
Item ID: | 81367 |
---|---|
Item Type: | Conference Item (Research - E1) |
ISBN: | 978-3-031-32636-3 |
Copyright Information: | © 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG |
Date Deposited: | 13 Dec 2023 22:59 |
FoR Codes: | 46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460401 Cryptography @ 40% 46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460403 Data security and protection @ 30% 46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460499 Cybersecurity and privacy not elsewhere classified @ 30% |
SEO Codes: | 22 INFORMATION AND COMMUNICATION SERVICES > 2299 Other information and communication services > 229999 Other information and communication services not elsewhere classified @ 50% 22 INFORMATION AND COMMUNICATION SERVICES > 2201 Communication technologies, systems and services > 220199 Communication technologies, systems and services not elsewhere classified @ 50% |
Downloads: |
Total: 1 |
More Statistics |