Abstract
Although threshold key-recovery systems for the discrete log based cryptosystems such as the ElGamal scheme have been proposed by Feldman and Pedersen [6, 11, 12], no (practical) threshold key-recovery system for the factoring based cryptosystems such as the RSA scheme has been proposed.
This paper proposes the first (practical) threshold key-recovery systems for the factoring based cryptosystems including the RSA and Rabin schemes. Almost all of the proposed systems are unconditionally secure, since the systems utilize unconditionally secure bit-commitment protocols and unconditionally secure VSS.
Preview
Unable to display preview. Download preview PDF.
References
Blakley, G.R.: Safeguarding Cryptographic Keys, Proc. of AFIPS 1979 Nat. Computer Conf., vol.48, pp.313–317 (Sep. 1979)
Blum, M.: Coin Flipping by Telephon, Proc. of COMPCON, IEEE, pp. 133–137 (1982).
Brickell, E., Chaum, D., DamgArd, I. and van de Graaf, Gradual and Verifiable Release of a Secret, Proc. of Crypto 87, LNCS, Springer-Verlag (1988).
Chor, B., Goldwasser, S., Micali, S. and Awerbuch, B.: Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults, Proc. of FOCS, pp.383–395 (1985).
Damgård, I.: Practical and Provably Secure Release of a Secret and Exchange of Signatures, Proc. of Eurocrypt'93, LNCS 765, Springer-Verlag, pp.200–217 (1994).
Feldman, P.: A Practical Scheme for Non-Interactive Verifiable Secret Sharing, Proc. of FOCS'87, pp.427–437 (1987).
Fiat, A. and Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems, Proc. of Crypto'86, LNCS 263, Springer-Verlag, pp. 186–194 (1986).
Micali, S.: Fair Public-Key Cryptosystems, Proc. of Crypto'92, LNCS, Springer-Verlag, pp.113–138 (1993).
Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes, Proc. of Crypto'92, LNCS 740, Springer-Verlag, pp.31–53 (1993).
Okamoto, T.: An Efficient Divisible Electronic Cash Scheme, Proc. of Crypto'95, LNCS 963, Springer-Verlag, pp.438–451 (1995).
Pedersen, T. P.: Distributed Provers with Applications to Undeniable Sigantures, Proc. of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.221–242 (1991).
Pedersen, T. P.: Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Proc. of Crypto'91, LNCS 576, Springer-Verlag, pp. 129–140 (1992).
Shamir, A.: How to Share a Secret, Comm. Assoc. Comput. Mach., vol.22, no.11, pp.612–613 (Nov. 1979)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Okamoto, T. (1998). Threshold key-recovery systems for RSA. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds) Security Protocols. Security Protocols 1997. Lecture Notes in Computer Science, vol 1361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028169
Download citation
DOI: https://doi.org/10.1007/BFb0028169
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64040-0
Online ISBN: 978-3-540-69688-9
eBook Packages: Springer Book Archive