File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Multi-key leakage-resilient threshold cryptography

TitleMulti-key leakage-resilient threshold cryptography
Authors
KeywordsLeakage-resilience
Key-exposure
Dynamic threshold public key encryption
Threshold ring signatures
Pairing
Privacy
Issue Date2013
PublisherACM.
Citation
The 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CCS 2013), Hangzhou, China, 8-10 May 2013. In Conference Proceedings, 2013, p. 61-70 How to Cite?
AbstractWith the goal of ensuring availability of security services such as encryption and authentication, we initiate the study of leakage-resilient threshold cryptography, for achieving formal security guarantee under various key-exposure attacks. A distinctive property of threshold cryptosystems is that a threshold number of secret keys are used in the main cryptographic function such as decryption or signing. Even though some existing security models allow leakages of multiple keys of different users, these keys are not used simultaneously to decrypt a ciphertext or sign a message. In this paper, we introduce the multi-key leakage-resilient security model for threshold cryptography. We also propose constructions with formal security guarantee with respect to our model, one is a dynamic threshold public key encryption scheme and another is a threshold ring signature scheme. © 2013 ACM.
Persistent Identifierhttp://hdl.handle.net/10722/189642
ISBN

 

DC FieldValueLanguage
dc.contributor.authorZhang, Cen_US
dc.contributor.authorYuen, THen_US
dc.contributor.authorXiong, Hen_US
dc.contributor.authorCbow, SSMen_US
dc.contributor.authorYiu, SMen_US
dc.contributor.authorHe, YJ-
dc.date.accessioned2013-09-17T14:50:34Z-
dc.date.available2013-09-17T14:50:34Z-
dc.date.issued2013en_US
dc.identifier.citationThe 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CCS 2013), Hangzhou, China, 8-10 May 2013. In Conference Proceedings, 2013, p. 61-70en_US
dc.identifier.isbn978-1-4503-1767-2-
dc.identifier.urihttp://hdl.handle.net/10722/189642-
dc.description.abstractWith the goal of ensuring availability of security services such as encryption and authentication, we initiate the study of leakage-resilient threshold cryptography, for achieving formal security guarantee under various key-exposure attacks. A distinctive property of threshold cryptosystems is that a threshold number of secret keys are used in the main cryptographic function such as decryption or signing. Even though some existing security models allow leakages of multiple keys of different users, these keys are not used simultaneously to decrypt a ciphertext or sign a message. In this paper, we introduce the multi-key leakage-resilient security model for threshold cryptography. We also propose constructions with formal security guarantee with respect to our model, one is a dynamic threshold public key encryption scheme and another is a threshold ring signature scheme. © 2013 ACM.-
dc.languageengen_US
dc.publisherACM.-
dc.relation.ispartofASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Securityen_US
dc.subjectLeakage-resilience-
dc.subjectKey-exposure-
dc.subjectDynamic threshold public key encryption-
dc.subjectThreshold ring signatures-
dc.subjectPairing-
dc.subjectPrivacy-
dc.titleMulti-key leakage-resilient threshold cryptographyen_US
dc.typeConference_Paperen_US
dc.identifier.emailZhang, C: congz@hku.hken_US
dc.identifier.emailYuen, TH: johnyuen@hku.hken_US
dc.identifier.emailYiu, SM: smyiu@cs.hku.hken_US
dc.identifier.authorityYiu, SM=rp00207en_US
dc.description.naturelink_to_OA_fulltext-
dc.identifier.doi10.1145/2484313.2484321-
dc.identifier.scopuseid_2-s2.0-84877943734-
dc.identifier.hkuros215066en_US
dc.identifier.hkuros223601-
dc.identifier.spage61en_US
dc.identifier.epage70en_US
dc.publisher.placeUnited States-
dc.customcontrol.immutablesml 140430-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats