Abstract.We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model ...
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session...
We present a new distributed, group ElGamal public key generation algorithm which also permits maint...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
Distributed key generation is a main component of threshold cryptosystems and distributed cryptograp...
In this work we study distributed public key schemes secure against continual memory leakage. The se...
In [16], Naor, Pinkas and Reingold introduced schemes in which some groups of servers distribute key...
We present a new distributed, group ElGamal public key generation algorithm which also permits maint...
Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the sec...
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strength...
In this paper, we present the first Asynchronous Distributed Key Generation (ADKG) algorithm which i...
Abstract. Key-insulated cryptography is a crucial technique for pro-tecting private keys. To strengt...
Distributed private key generators (PKGs) in identity-based encryption (IBE) is a viable approach to...
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted mes...
Abstract Several public key cryptosystems with additional homomor phic properties have been propose...
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session...
We present a new distributed, group ElGamal public key generation algorithm which also permits maint...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
Distributed key generation is a main component of threshold cryptosystems and distributed cryptograp...
In this work we study distributed public key schemes secure against continual memory leakage. The se...
In [16], Naor, Pinkas and Reingold introduced schemes in which some groups of servers distribute key...
We present a new distributed, group ElGamal public key generation algorithm which also permits maint...
Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the sec...
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strength...
In this paper, we present the first Asynchronous Distributed Key Generation (ADKG) algorithm which i...
Abstract. Key-insulated cryptography is a crucial technique for pro-tecting private keys. To strengt...
Distributed private key generators (PKGs) in identity-based encryption (IBE) is a viable approach to...
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted mes...
Abstract Several public key cryptosystems with additional homomor phic properties have been propose...
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session...
We present a new distributed, group ElGamal public key generation algorithm which also permits maint...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...