Abstract
In this paper we discuss the security issue of distributed key generation in a distributed threshold protocol. We identify two subtle flaws in the previously proposed discrete-log based distributed key generation protocols. We propose a discrete-log based distributed key generation protocol that meets the necessary security requirements and has no such flaws.
Research supported in part by the Ministry of Education grant for Excellence 90-E-FA04-1-4, Taiwan, ROC.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, and Tal Rabin. Robust threshold DSS signatures. In Proceedings of Advances in Cryptology-EUROCRYPT’96, volume 1070 of LNCS, pages 354–371. Springer-Verlag, 1996.
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, and Tal Rabin. Secure distributed key generation for discrete-log based cryptosystems. In Proceedings of Advances in Cryptology-EUROCRYPT’ 9, volume 1592 of LNCS, pages 295–310. Springer-Verlag, 1999.
HJJ+97._Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung. Proactive public key and signature systems. In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 100–110. ACM, 1997.
Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung. Proactive secret sharing or: How to cope with perpetual leakage. In Proceedings of Advances in Cryptology-CRYPTO’ 95, volume 963 of LNCS, pages 339–352. Springer-Verlag, 1995.
Torben P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Proceedings of Advances in Cryptology-CRYPTO’ 91, volume 576 of LNCS, pages 129–140. Springer-Verlag, 1991.
Wen-Guey Tzeng and Chi-Ming Hu. Inter-protocol interleaving attacks on some authentication and key distribution protocls. Information Processing Letters, 69:297–302, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chu, CK., Tzeng, WG. (2002). Distributed Key Generation as a Component of an Integrated Protocol. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_35
Download citation
DOI: https://doi.org/10.1007/3-540-36159-6_35
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00164-5
Online ISBN: 978-3-540-36159-6
eBook Packages: Springer Book Archive