Pseudorandom intermixing: A tool for shared cryptography

0Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Designing distributed cryptographic protocols that combine correctness, security, efficiency and practical constraints can be very difficult. Here, we suggest a new modular tool that we call “pseudorandom intermixing”which allows parties (or architectural components, such as hardware devices) sharing pseudorandomness to mix extra correlated pseudorandom information inside their computational results. We show how the pseudorandom intermixing may ease the design, increase efficiency and allow more refined control of cryptographic protocols for several important tasks, while maintaining “provable security.” It can even turn a “heuristic protocol” into a “provably secure” one. We concentrate on the area of “distributed public key systems,” which has been a very active area of research in the last decade, and for which there is a great interest in practical implementations of protocols. Among other things, we demonstrate the first “fault-free non-interactive” proactive maintenance protocol for RSA, which involves a single broadcast round to perform an update, if parties do not behave maliciously. We also demonstrate how to interlace access control within the messaging of proactive RSA; this assures elimination of corrupted entities.

Cite

CITATION STYLE

APA

Frankel, Y., Mackenzie, P., & Yung, M. (2000). Pseudorandom intermixing: A tool for shared cryptography. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1751, pp. 306–325). Springer Verlag. https://doi.org/10.1007/978-3-540-46588-1_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free