Adaptively Secure Non-interactive Threshold Cryptosystems
Threshold cryptography aims at enhancing the availability and security of decryption and signature schemes by splitting private keys into several (say n) shares (typically, each of size comparable to the original secret key). In these schemes, a quorum of at least (t ≤ n) servers needs to act upon a...
Saved in:
| Published in | Automata, Languages and Programming pp. 588 - 600 |
|---|---|
| Main Authors | , |
| Format | Book Chapter |
| Language | English |
| Published |
Berlin, Heidelberg
Springer Berlin Heidelberg
2011
|
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 9783642220111 3642220118 |
| ISSN | 0302-9743 1611-3349 |
| DOI | 10.1007/978-3-642-22012-8_47 |
Cover
| Abstract | Threshold cryptography aims at enhancing the availability and security of decryption and signature schemes by splitting private keys into several (say n) shares (typically, each of size comparable to the original secret key). In these schemes, a quorum of at least (t ≤ n) servers needs to act upon a message to produce the result (decrypted value or signature), while corrupting less than t servers maintains the scheme’s security. For about two decades, extensive study was dedicated to this subject, which created a number of notable results. So far, most practical threshold signatures, where servers act non-interactively, were analyzed in the limited static corruption model (where the adversary chooses which servers will be corrupted at the system’s initialization stage). Existing threshold encryption schemes that withstand the strongest combination of adaptive malicious corruptions (allowing the adversary to corrupt servers at any time based on its complete view), and chosen-ciphertext attacks (CCA) all require interaction (in the non-idealized model) and attempts to remedy this problem resulted only in relaxed schemes. The same is true for threshold signatures secure under chosen-message attacks (CMA).
To date (for about 10 years), it has been open whether there are non-interactive threshold schemes providing the highest security (namely, CCA-secure encryption and CMA-secure signature) with scalable shares (i.e., as short as the original key) and adaptive security. This paper answers this question affirmatively by presenting such efficient decryption and signature schemes within a unified algebraic framework. |
|---|---|
| AbstractList | Threshold cryptography aims at enhancing the availability and security of decryption and signature schemes by splitting private keys into several (say n) shares (typically, each of size comparable to the original secret key). In these schemes, a quorum of at least (t ≤ n) servers needs to act upon a message to produce the result (decrypted value or signature), while corrupting less than t servers maintains the scheme’s security. For about two decades, extensive study was dedicated to this subject, which created a number of notable results. So far, most practical threshold signatures, where servers act non-interactively, were analyzed in the limited static corruption model (where the adversary chooses which servers will be corrupted at the system’s initialization stage). Existing threshold encryption schemes that withstand the strongest combination of adaptive malicious corruptions (allowing the adversary to corrupt servers at any time based on its complete view), and chosen-ciphertext attacks (CCA) all require interaction (in the non-idealized model) and attempts to remedy this problem resulted only in relaxed schemes. The same is true for threshold signatures secure under chosen-message attacks (CMA).
To date (for about 10 years), it has been open whether there are non-interactive threshold schemes providing the highest security (namely, CCA-secure encryption and CMA-secure signature) with scalable shares (i.e., as short as the original key) and adaptive security. This paper answers this question affirmatively by presenting such efficient decryption and signature schemes within a unified algebraic framework. |
| Author | Libert, Benoît Yung, Moti |
| Author_xml | – sequence: 1 givenname: Benoît surname: Libert fullname: Libert, Benoît organization: ICTEAM Institute, Université catholique de Louvain, Belgium – sequence: 2 givenname: Moti surname: Yung fullname: Yung, Moti organization: Columbia University, USA |
| BookMark | eNo1kM1OhDAUhauOiczIG7jgBaq9vf2B5YT4l0x04bhuWigOikAomvD2wqhnc5Nzbk5yvjVZtV3rCbkCdg2M6ZtMpxSpEpxyzoDT1Ah9QtY4O0dDnZIIFABFFNkZief__wxgRSKGjNNMC7wgcQjvbJZEprmMSLYtbT_W376ZkhdffA0-eepaWrejH2yxBMn-MPhw6JoyyYepH7swhdF_hktyXtkm-Pjvbsjr3e0-f6C75_vHfLujAQA1Lbx0MnUiLTNfOeU4apWWEpyyBVjgDionIAP0EgEE2sJKoYXWyIQVVYUbwn97Qz_U7ZsfjOu6j2CAmQWOmccaNPNcc2RhFjj4A5cqVEE |
| ContentType | Book Chapter |
| Copyright | Springer-Verlag Berlin Heidelberg 2011 |
| Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2011 |
| DOI | 10.1007/978-3-642-22012-8_47 |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Mathematics Computer Science |
| EISBN | 3642220126 9783642220128 |
| EISSN | 1611-3349 |
| Editor | Aceto, Luca Henzinger, Monika Sgall, Jiří |
| Editor_xml | – sequence: 1 givenname: Luca surname: Aceto fullname: Aceto, Luca email: luca@ru.is – sequence: 2 givenname: Monika surname: Henzinger fullname: Henzinger, Monika email: mhenzinger@gmail.com – sequence: 3 givenname: Jiří surname: Sgall fullname: Sgall, Jiří email: sgall@kam.mff.cuni.cz |
| EndPage | 600 |
| GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF LAS LDH P2P RNI RSU SVGTG VI1 ~02 |
| ID | FETCH-LOGICAL-s1137-ce5b58b48d9efb6b23768d51b6ac1a12b1fb41913e531143aca547477304a4ff3 |
| ISBN | 9783642220111 3642220118 |
| ISSN | 0302-9743 |
| IngestDate | Wed Sep 17 03:57:25 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-s1137-ce5b58b48d9efb6b23768d51b6ac1a12b1fb41913e531143aca547477304a4ff3 |
| PageCount | 13 |
| ParticipantIDs | springer_books_10_1007_978_3_642_22012_8_47 |
| PublicationCentury | 2000 |
| PublicationDate | 2011 |
| PublicationDateYYYYMMDD | 2011-01-01 |
| PublicationDate_xml | – year: 2011 text: 2011 |
| PublicationDecade | 2010 |
| PublicationPlace | Berlin, Heidelberg |
| PublicationPlace_xml | – name: Berlin, Heidelberg |
| PublicationSeriesTitle | Lecture Notes in Computer Science |
| PublicationSubtitle | 38th International Colloquium, ICALP 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part II |
| PublicationTitle | Automata, Languages and Programming |
| PublicationYear | 2011 |
| Publisher | Springer Berlin Heidelberg |
| Publisher_xml | – name: Springer Berlin Heidelberg |
| RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Nierstrasz, Oscar Steffen, Bernhard Kittler, Josef Vardi, Moshe Y. Weikum, Gerhard Sudan, Madhu Naor, Moni Mitchell, John C. Terzopoulos, Demetri Pandu Rangan, C. Kanade, Takeo Hutchison, David Tygar, Doug |
| RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, Lancaster, UK – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, UK – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: ETH Zurich, Zurich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford University, Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: Oscar surname: Nierstrasz fullname: Nierstrasz, Oscar organization: University of Bern, Bern, Switzerland – sequence: 9 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology, Madras, India – sequence: 10 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: University of Dortmund, Dortmund, Germany – sequence: 11 givenname: Madhu surname: Sudan fullname: Sudan, Madhu organization: Massachusetts Institute of Technology, USA – sequence: 12 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 13 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: University of California, Berkeley, USA – sequence: 14 givenname: Moshe Y. surname: Vardi fullname: Vardi, Moshe Y. organization: Rice University, Houston, USA – sequence: 15 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max-Planck Institute of Computer Science, Saarbrücken, Germany |
| SSID | ssj0000530725 ssj0002792 ssj0000530724 |
| Score | 1.4565747 |
| Snippet | Threshold cryptography aims at enhancing the availability and security of decryption and signature schemes by splitting private keys into several (say n)... |
| SourceID | springer |
| SourceType | Publisher |
| StartPage | 588 |
| SubjectTerms | adaptive corruptions digital signatures encryption schemes non-interactivity Threshold cryptography |
| Title | Adaptively Secure Non-interactive Threshold Cryptosystems |
| URI | http://link.springer.com/10.1007/978-3-642-22012-8_47 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS-wwFA46bvQufKPXB124K5WpTdJ24UJkRMSZ1XjxrkrSpiBoK7YK3l9_z8mjrQ8E3ZSZUGbS86VfTk7Od0LIUZJyVkRMBCnPaUBlPA5EGIogT1mK-5xFWWBoYDrjlzf06pbd9nJFrS5p5XH-71NdyU9QhTbAFVWy30C2-1FogM-AL1wBYbi-c37fhlmtCrKtwd0URt1soo6NS_7HnKsHNythvo0uoqvBVFWtd8cnXcLLX_vCT-v2bjiEzgrxiGx4_2rC8sqf1VWABSa0tOpF-XMYCQ1uYPnnT6-Pbd0M6p-jBVRzem03KWZ1q3O_fHeOhKOVYdxBq--GcQcXd_S_KMulJSIYYxo7RrVKLWBhWMcYYlOGeDmWU4xM-VJLpswc-GfnZa4rmn6k_GGWB0etEfwbkHxG40WyCB0YkaWzydX1ny7yBrQzjq0mpv_eL5qwpKLZezK9REWQe4rE1Gzqn2qgxvysCx_217XbMl8jv1DK4qHGBAy-ThZUtUFWHQCeBWCDrEy74r3NJkl73D2Du_cOd6_D3XuD-xa5uZjMzy8De8JG0IRhFAe5YpIlkiZFqkrJJaZIJQULJRd5KMITGZaSwoo-UkDV4FmLXDAKC1CYFqigZRltk1FVV2qHeIWIlBiXHCZyRgUvkxgaKDrAMk_zKN4lvrNEhu9Mk7mC2WC3LMrAbpm2W4Z2-_2tu_fIcj9C98mofXpWB-ArtvLQgv8feUpdJg |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Automata%2C+Languages+and+Programming&rft.au=Libert%2C+Beno%C3%AEt&rft.au=Yung%2C+Moti&rft.atitle=Adaptively+Secure+Non-interactive+Threshold+Cryptosystems&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2011-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642220111&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=588&rft.epage=600&rft_id=info:doi/10.1007%2F978-3-642-22012-8_47 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |