Distributed Paillier cryptosystem without trusted dealer

Takashi Nishide, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)

Abstract

We propose a distributed key generation protocol for the threshold Paillier cryptosystem. Often in the multiparty computation based on the threshold Paillier cryptosystem, the existence of a trusted dealer is assumed to distribute secret key shares, but it can be a single point of attack, so it is not preferable. Building on the threshold Paillier cryptosystem with a trusted dealer, we show how to eliminate the trusted dealer by robust distributed key generation without using safe primes.

Original languageEnglish
Title of host publicationInformation Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers
Pages44-60
Number of pages17
DOIs
Publication statusPublished - Feb 1 2011
Event11th International Workshop on Information Security Applications, WISA 2010 - Jeju Island, Korea, Republic of
Duration: Aug 24 2010Aug 26 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6513 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other11th International Workshop on Information Security Applications, WISA 2010
CountryKorea, Republic of
CityJeju Island
Period8/24/108/26/10

Fingerprint

Cryptosystem
Cryptography
Multiparty Computation
Eliminate
Attack

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Nishide, T., & Sakurai, K. (2011). Distributed Paillier cryptosystem without trusted dealer. In Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers (pp. 44-60). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6513 LNCS). https://doi.org/10.1007/978-3-642-17955-6-4

Distributed Paillier cryptosystem without trusted dealer. / Nishide, Takashi; Sakurai, Kouichi.

Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. 2011. p. 44-60 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6513 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nishide, T & Sakurai, K 2011, Distributed Paillier cryptosystem without trusted dealer. in Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6513 LNCS, pp. 44-60, 11th International Workshop on Information Security Applications, WISA 2010, Jeju Island, Korea, Republic of, 8/24/10. https://doi.org/10.1007/978-3-642-17955-6-4
Nishide T, Sakurai K. Distributed Paillier cryptosystem without trusted dealer. In Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. 2011. p. 44-60. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-17955-6-4
Nishide, Takashi ; Sakurai, Kouichi. / Distributed Paillier cryptosystem without trusted dealer. Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. 2011. pp. 44-60 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{7b3ed3b9495f4c10b12a4950f5c86a4e,
title = "Distributed Paillier cryptosystem without trusted dealer",
abstract = "We propose a distributed key generation protocol for the threshold Paillier cryptosystem. Often in the multiparty computation based on the threshold Paillier cryptosystem, the existence of a trusted dealer is assumed to distribute secret key shares, but it can be a single point of attack, so it is not preferable. Building on the threshold Paillier cryptosystem with a trusted dealer, we show how to eliminate the trusted dealer by robust distributed key generation without using safe primes.",
author = "Takashi Nishide and Kouichi Sakurai",
year = "2011",
month = "2",
day = "1",
doi = "10.1007/978-3-642-17955-6-4",
language = "English",
isbn = "3642179541",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "44--60",
booktitle = "Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers",

}

TY - GEN

T1 - Distributed Paillier cryptosystem without trusted dealer

AU - Nishide, Takashi

AU - Sakurai, Kouichi

PY - 2011/2/1

Y1 - 2011/2/1

N2 - We propose a distributed key generation protocol for the threshold Paillier cryptosystem. Often in the multiparty computation based on the threshold Paillier cryptosystem, the existence of a trusted dealer is assumed to distribute secret key shares, but it can be a single point of attack, so it is not preferable. Building on the threshold Paillier cryptosystem with a trusted dealer, we show how to eliminate the trusted dealer by robust distributed key generation without using safe primes.

AB - We propose a distributed key generation protocol for the threshold Paillier cryptosystem. Often in the multiparty computation based on the threshold Paillier cryptosystem, the existence of a trusted dealer is assumed to distribute secret key shares, but it can be a single point of attack, so it is not preferable. Building on the threshold Paillier cryptosystem with a trusted dealer, we show how to eliminate the trusted dealer by robust distributed key generation without using safe primes.

UR - http://www.scopus.com/inward/record.url?scp=79251573851&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79251573851&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-17955-6-4

DO - 10.1007/978-3-642-17955-6-4

M3 - Conference contribution

AN - SCOPUS:79251573851

SN - 3642179541

SN - 9783642179549

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 44

EP - 60

BT - Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers

ER -