Secure distributed key generation for discrete-log based cryptosystems

被引:232
作者
Gennaro, Rosario
Jarecki, Stanislaw
Krawczyk, Hugo
Rabin, Tal
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
[2] Univ Calif Irvine, Sch Informat & Comp Sci, Irvine, CA 92697 USA
关键词
DIGITAL SIGNATURE SCHEME; LOGARITHMS; SECRET;
D O I
10.1007/s00145-006-0347-3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosysterns required to initialize the cryptosystem securely and generate its private and public keys. In the case of discrete-log-based (dlog-based) threshold signature schemes (EIGamal and its derivatives), the DKG protocol is further used in the distributed signature generation phase to generate one-time signature randomizers (r = g(k)). In this paper we show that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random distribution of generated keys: we describe an efficient active attacker controlling a small number of parties which successfully biases the values of the generated keys away from uniform. We then present a new DKG protocol for the setting of dlog-based cryptosystems which we prove to satisfy the security requirements from DKG protocols and, in particular, it ensures a uniform distribution of the generated keys. The new protocol can be used as a secure replacement for the many applications of Pedersen's protocol. Motivated by the fact that the new DKG protocol incurs additional communication cost relative to Pedersen's original protocol, we investigate whether the latter can be used in specific applications which require relaxed security properties from the DKG protocol. We answer this question affirmatively by showing that Pedersen's protocol suffices for the secure implementation of certain threshold cryptosystems whose security can be reduced to the hardness of the discrete logarithm problem. In particular, we show Pedersen's DKG to be sufficient for the construction of a threshold Schnorr signature scheme. Finally, we observe an interesting trade-off between security (reductions), computation, and communication that arises when comparing Pedersen's DKG protocol with ours.
引用
收藏
页码:51 / 83
页数:33
相关论文
共 33 条
  • [1] [Anonymous], LNCS
  • [2] [Anonymous], LNCS
  • [3] Secure intrusion-tolerant replication on the Internet
    Cachin, C
    Poritz, JA
    [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 167 - 176
  • [4] Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P209, DOI 10.1145/276698.276741
  • [5] Canetti R, 1997, LECT NOTES COMPUT SC, V1294, P90
  • [6] Canetti R., 1999, LNCS, V1666, P98
  • [7] CERECEDO M, 1993, IEICE T FUND ELECTR, VE76A, P532
  • [8] Chor B., 1985, 26 ANN S FDN COMP SC, P383
  • [9] Cramer R., 1997, LNCS, V1233, P103
  • [10] DAI W, BENCHMARKS CRYPTO 4