Adaptively Secure Non-interactive Threshold Cryptosystems

Threshold cryptography aims at enhancing the availability and security of decryption and signature schemes by splitting private keys into several (say n) shares (typically, each of size comparable to the original secret key). In these schemes, a quorum of at least (t ≤ n) servers needs to act upon a...

Full description

Saved in:
Bibliographic Details
Published inAutomata, Languages and Programming pp. 588 - 600
Main Authors Libert, Benoît, Yung, Moti
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg 2011
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783642220111
3642220118
ISSN0302-9743
1611-3349
DOI10.1007/978-3-642-22012-8_47

Cover

Abstract Threshold cryptography aims at enhancing the availability and security of decryption and signature schemes by splitting private keys into several (say n) shares (typically, each of size comparable to the original secret key). In these schemes, a quorum of at least (t ≤ n) servers needs to act upon a message to produce the result (decrypted value or signature), while corrupting less than t servers maintains the scheme’s security. For about two decades, extensive study was dedicated to this subject, which created a number of notable results. So far, most practical threshold signatures, where servers act non-interactively, were analyzed in the limited static corruption model (where the adversary chooses which servers will be corrupted at the system’s initialization stage). Existing threshold encryption schemes that withstand the strongest combination of adaptive malicious corruptions (allowing the adversary to corrupt servers at any time based on its complete view), and chosen-ciphertext attacks (CCA) all require interaction (in the non-idealized model) and attempts to remedy this problem resulted only in relaxed schemes. The same is true for threshold signatures secure under chosen-message attacks (CMA). To date (for about 10 years), it has been open whether there are non-interactive threshold schemes providing the highest security (namely, CCA-secure encryption and CMA-secure signature) with scalable shares (i.e., as short as the original key) and adaptive security. This paper answers this question affirmatively by presenting such efficient decryption and signature schemes within a unified algebraic framework.
AbstractList Threshold cryptography aims at enhancing the availability and security of decryption and signature schemes by splitting private keys into several (say n) shares (typically, each of size comparable to the original secret key). In these schemes, a quorum of at least (t ≤ n) servers needs to act upon a message to produce the result (decrypted value or signature), while corrupting less than t servers maintains the scheme’s security. For about two decades, extensive study was dedicated to this subject, which created a number of notable results. So far, most practical threshold signatures, where servers act non-interactively, were analyzed in the limited static corruption model (where the adversary chooses which servers will be corrupted at the system’s initialization stage). Existing threshold encryption schemes that withstand the strongest combination of adaptive malicious corruptions (allowing the adversary to corrupt servers at any time based on its complete view), and chosen-ciphertext attacks (CCA) all require interaction (in the non-idealized model) and attempts to remedy this problem resulted only in relaxed schemes. The same is true for threshold signatures secure under chosen-message attacks (CMA). To date (for about 10 years), it has been open whether there are non-interactive threshold schemes providing the highest security (namely, CCA-secure encryption and CMA-secure signature) with scalable shares (i.e., as short as the original key) and adaptive security. This paper answers this question affirmatively by presenting such efficient decryption and signature schemes within a unified algebraic framework.
Author Libert, Benoît
Yung, Moti
Author_xml – sequence: 1
  givenname: Benoît
  surname: Libert
  fullname: Libert, Benoît
  organization: ICTEAM Institute, Université catholique de Louvain, Belgium
– sequence: 2
  givenname: Moti
  surname: Yung
  fullname: Yung, Moti
  organization: Columbia University, USA
BookMark eNo1kM1OhDAUhauOiczIG7jgBaq9vf2B5YT4l0x04bhuWigOikAomvD2wqhnc5Nzbk5yvjVZtV3rCbkCdg2M6ZtMpxSpEpxyzoDT1Ah9QtY4O0dDnZIIFABFFNkZief__wxgRSKGjNNMC7wgcQjvbJZEprmMSLYtbT_W376ZkhdffA0-eepaWrejH2yxBMn-MPhw6JoyyYepH7swhdF_hktyXtkm-Pjvbsjr3e0-f6C75_vHfLujAQA1Lbx0MnUiLTNfOeU4apWWEpyyBVjgDionIAP0EgEE2sJKoYXWyIQVVYUbwn97Qz_U7ZsfjOu6j2CAmQWOmccaNPNcc2RhFjj4A5cqVEE
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2011
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2011
DOI 10.1007/978-3-642-22012-8_47
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
Computer Science
EISBN 3642220126
9783642220128
EISSN 1611-3349
Editor Aceto, Luca
Henzinger, Monika
Sgall, Jiří
Editor_xml – sequence: 1
  givenname: Luca
  surname: Aceto
  fullname: Aceto, Luca
  email: luca@ru.is
– sequence: 2
  givenname: Monika
  surname: Henzinger
  fullname: Henzinger, Monika
  email: mhenzinger@gmail.com
– sequence: 3
  givenname: Jiří
  surname: Sgall
  fullname: Sgall, Jiří
  email: sgall@kam.mff.cuni.cz
EndPage 600
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-s1137-ce5b58b48d9efb6b23768d51b6ac1a12b1fb41913e531143aca547477304a4ff3
ISBN 9783642220111
3642220118
ISSN 0302-9743
IngestDate Wed Sep 17 03:57:25 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s1137-ce5b58b48d9efb6b23768d51b6ac1a12b1fb41913e531143aca547477304a4ff3
PageCount 13
ParticipantIDs springer_books_10_1007_978_3_642_22012_8_47
PublicationCentury 2000
PublicationDate 2011
PublicationDateYYYYMMDD 2011-01-01
PublicationDate_xml – year: 2011
  text: 2011
PublicationDecade 2010
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSubtitle 38th International Colloquium, ICALP 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part II
PublicationTitle Automata, Languages and Programming
PublicationYear 2011
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Steffen, Bernhard
Kittler, Josef
Vardi, Moshe Y.
Weikum, Gerhard
Sudan, Madhu
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, Lancaster, UK
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, UK
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zurich, Zurich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University, Stanford, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
  organization: University of Bern, Bern, Switzerland
– sequence: 9
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology, Madras, India
– sequence: 10
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: University of Dortmund, Dortmund, Germany
– sequence: 11
  givenname: Madhu
  surname: Sudan
  fullname: Sudan, Madhu
  organization: Massachusetts Institute of Technology, USA
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 13
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
  organization: University of California, Berkeley, USA
– sequence: 14
  givenname: Moshe Y.
  surname: Vardi
  fullname: Vardi, Moshe Y.
  organization: Rice University, Houston, USA
– sequence: 15
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max-Planck Institute of Computer Science, Saarbrücken, Germany
SSID ssj0000530725
ssj0002792
ssj0000530724
Score 1.4565747
Snippet Threshold cryptography aims at enhancing the availability and security of decryption and signature schemes by splitting private keys into several (say n)...
SourceID springer
SourceType Publisher
StartPage 588
SubjectTerms adaptive corruptions
digital signatures
encryption schemes
non-interactivity
Threshold cryptography
Title Adaptively Secure Non-interactive Threshold Cryptosystems
URI http://link.springer.com/10.1007/978-3-642-22012-8_47
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS-wwFA46bvQufKPXB124K5WpTdJ24UJkRMSZ1XjxrkrSpiBoK7YK3l9_z8mjrQ8E3ZSZUGbS86VfTk7Od0LIUZJyVkRMBCnPaUBlPA5EGIogT1mK-5xFWWBoYDrjlzf06pbd9nJFrS5p5XH-71NdyU9QhTbAFVWy30C2-1FogM-AL1wBYbi-c37fhlmtCrKtwd0URt1soo6NS_7HnKsHNythvo0uoqvBVFWtd8cnXcLLX_vCT-v2bjiEzgrxiGx4_2rC8sqf1VWABSa0tOpF-XMYCQ1uYPnnT6-Pbd0M6p-jBVRzem03KWZ1q3O_fHeOhKOVYdxBq--GcQcXd_S_KMulJSIYYxo7RrVKLWBhWMcYYlOGeDmWU4xM-VJLpswc-GfnZa4rmn6k_GGWB0etEfwbkHxG40WyCB0YkaWzydX1ny7yBrQzjq0mpv_eL5qwpKLZezK9REWQe4rE1Gzqn2qgxvysCx_217XbMl8jv1DK4qHGBAy-ThZUtUFWHQCeBWCDrEy74r3NJkl73D2Du_cOd6_D3XuD-xa5uZjMzy8De8JG0IRhFAe5YpIlkiZFqkrJJaZIJQULJRd5KMITGZaSwoo-UkDV4FmLXDAKC1CYFqigZRltk1FVV2qHeIWIlBiXHCZyRgUvkxgaKDrAMk_zKN4lvrNEhu9Mk7mC2WC3LMrAbpm2W4Z2-_2tu_fIcj9C98mofXpWB-ArtvLQgv8feUpdJg
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Automata%2C+Languages+and+Programming&rft.au=Libert%2C+Beno%C3%AEt&rft.au=Yung%2C+Moti&rft.atitle=Adaptively+Secure+Non-interactive+Threshold+Cryptosystems&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2011-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642220111&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=588&rft.epage=600&rft_id=info:doi/10.1007%2F978-3-642-22012-8_47
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon