Skip to main content

Distributed Key Generation as a Component of an Integrated Protocol

  • Conference paper
  • First Online:
  • 812 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2513))

Abstract

In this paper we discuss the security issue of distributed key generation in a distributed threshold protocol. We identify two subtle flaws in the previously proposed discrete-log based distributed key generation protocols. We propose a discrete-log based distributed key generation protocol that meets the necessary security requirements and has no such flaws.

Research supported in part by the Ministry of Education grant for Excellence 90-E-FA04-1-4, Taiwan, ROC.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, and Tal Rabin. Robust threshold DSS signatures. In Proceedings of Advances in Cryptology-EUROCRYPT’96, volume 1070 of LNCS, pages 354–371. Springer-Verlag, 1996.

    Google Scholar 

  2. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, and Tal Rabin. Secure distributed key generation for discrete-log based cryptosystems. In Proceedings of Advances in Cryptology-EUROCRYPT’ 9, volume 1592 of LNCS, pages 295–310. Springer-Verlag, 1999.

    Google Scholar 

  3. HJJ+97._Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung. Proactive public key and signature systems. In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 100–110. ACM, 1997.

    Google Scholar 

  4. Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung. Proactive secret sharing or: How to cope with perpetual leakage. In Proceedings of Advances in Cryptology-CRYPTO’ 95, volume 963 of LNCS, pages 339–352. Springer-Verlag, 1995.

    Google Scholar 

  5. Torben P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Proceedings of Advances in Cryptology-CRYPTO’ 91, volume 576 of LNCS, pages 129–140. Springer-Verlag, 1991.

    Google Scholar 

  6. Wen-Guey Tzeng and Chi-Ming Hu. Inter-protocol interleaving attacks on some authentication and key distribution protocls. Information Processing Letters, 69:297–302, 1999.

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chu, CK., Tzeng, WG. (2002). Distributed Key Generation as a Component of an Integrated Protocol. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_35

Download citation

  • DOI: https://doi.org/10.1007/3-540-36159-6_35

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00164-5

  • Online ISBN: 978-3-540-36159-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics