Strong cryptography from weak secrets: Building efficient PKE and IBE from distributed passwords

7Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Boyen, X., Chevalier, C., Fuchsbauer, G., & Pointcheval, D. (2010). Strong cryptography from weak secrets: Building efficient PKE and IBE from distributed passwords. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6055 LNCS, pp. 297–315). https://doi.org/10.1007/978-3-642-12678-9_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free