Research output: Contribution to book/anthology/report/proceeding › Article in proceedings › Research › peer-review
Final published version
Threshold RSA encryption and signing is a very useful tool to increase the security of the secret keys used. Key generation is, however, either done in a non-threshold way, or computationally inefficient protocols are used. This is not a big problem in a setup where one organization has a few high profile keys to secure, however, this does not scale well to systems with a lot of secret keys, like eID schemes where there exist one key pair per user, especially not if the we want the users’ personal devices like smart phones to participate in the threshold setup. In this paper we present novel approaches to distributed RSA key generation which are efficient enough to let smart phones participate. This is done by generating keys consisting of more than two primes instead of generating standard RSA keys. We present a 2-party protocol based on the ideas of [BH98] which produces a 3-prime modulo. We demonstrate that the protocol is efficient enough to be used in practical scenarios even from a mobile device which has not been demonstrated before. Then we show the first 2-party distributed multiprime RSA key generation protocol that are as efficient as standard centralized key generation, even if security against malicious adversaries is desired. Further, we show that RSA keys based on moduli with more than two prime factors and where part of the factorization is leaked to the adversary are useful in practice by showing that commonly used schemes such as PSS-RSA and OAEP-RSA is secure even if the adversary knows a partial factorization of the multiprime moduli. From all other parties the generated keys cannot be distinguished from standard RSA keys, which is very important as this make these protocols compatible with existing infrastructure and standards.
Original language | English |
---|---|
Title of host publication | Information Security and Cryptology - ICISC 2014 - 17th International Conference, Revised Selected Papers |
Editors | Jongsung Kim, Jooyoung Lee |
Number of pages | 16 |
Publisher | Springer |
Publication year | 1 Jan 2014 |
Pages | 18-33 |
ISBN (Electronic) | 9783319159423 |
DOIs | |
Publication status | Published - 1 Jan 2014 |
Event | 17th International Conference on Information Security and Cryptology, ICISC 2014 - Seoul, Korea, Republic of Duration: 3 Dec 2014 → 5 Dec 2014 |
Conference | 17th International Conference on Information Security and Cryptology, ICISC 2014 |
---|---|
Land | Korea, Republic of |
By | Seoul |
Periode | 03/12/2014 → 05/12/2014 |
Sponsor | Korean Institute of Information Security and Cryptology |
Series | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 8949 |
ISSN | 0302-9743 |
See relations at Aarhus University Citationformats
ID: 175971980