Journal of Cryptology, volume 32, issue 2, pages 265-323

Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

Carmit Hazay 1
Gert Læssøe Mikkelsen 2
Tal Rabin 3
Tomas Toft 4
Angelo Agatino Nicolosi 5
2
 
The Alexandra Institute, Aarhus, Denmark
3
 
IBM T.J. Watson Research Center, Yorktown heights, USA
4
 
Partisia, Aarhus N, Denmark
5
 
YanchWare, Brædstrup, Denmark
Publication typeJournal Article
Publication date2018-02-05
Q1
Q1
SJR1.433
CiteScore7.1
Impact factor2.3
ISSN09332790, 14321378
Computer Science Applications
Applied Mathematics
Software
Abstract
The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite with security against malicious behavior. Our second contribution is a complete Paillier (in: EUROCRYPT, pp 223–238, 1999) threshold encryption scheme in the two-party setting with security against malicious attacks. We further describe how to extend our protocols to the multiparty setting with dishonest majority. Our RSA key generation protocol is comprised of the following subprotocols: (i) a distributed protocol for generation of an RSA composite and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite for the public key and is comprised of the following subprotocols: (i) a distributed generation of the corresponding secret key shares and (ii) a distributed decryption protocol for decrypting according to Paillier.
Found 
Found 

Top-30

Journals

2
4
6
8
10
12
Lecture Notes in Computer Science
12 publications, 27.91%
IEEE Transactions on Information Forensics and Security
3 publications, 6.98%
ACM Transactions on Internet Technology
2 publications, 4.65%
Journal of Cryptology
2 publications, 4.65%
Security and Safety
1 publication, 2.33%
IET Communications
1 publication, 2.33%
Symmetry
1 publication, 2.33%
Computers, Materials and Continua
1 publication, 2.33%
Internet Technology Letters
1 publication, 2.33%
IEEE Transactions on Vehicular Technology
1 publication, 2.33%
Wireless Communications and Mobile Computing
1 publication, 2.33%
Security and Communication Networks
1 publication, 2.33%
IEEE Transactions on Circuits and Systems for Video Technology
1 publication, 2.33%
International Journal of Information Security
1 publication, 2.33%
Advances in Digital Crime, Forensics, and Cyber Terrorism
1 publication, 2.33%
Electronics (Switzerland)
1 publication, 2.33%
Wireless Networks
1 publication, 2.33%
IEEE Transactions on Cloud Computing
1 publication, 2.33%
Computer Communications
1 publication, 2.33%
Theoretical Computer Science
1 publication, 2.33%
2
4
6
8
10
12

Publishers

2
4
6
8
10
12
14
16
Springer Nature
16 publications, 37.21%
Institute of Electrical and Electronics Engineers (IEEE)
9 publications, 20.93%
Association for Computing Machinery (ACM)
6 publications, 13.95%
MDPI
2 publications, 4.65%
Hindawi Limited
2 publications, 4.65%
Elsevier
2 publications, 4.65%
EDP Sciences
1 publication, 2.33%
Institution of Engineering and Technology (IET)
1 publication, 2.33%
Tech Science Press
1 publication, 2.33%
Wiley
1 publication, 2.33%
IGI Global
1 publication, 2.33%
2
4
6
8
10
12
14
16
  • We do not take into account publications without a DOI.
  • Statistics recalculated only for publications connected to researchers, organizations and labs registered on the platform.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
Share
Cite this
GOST |
Cite this
GOST Copy
Hazay C. et al. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting // Journal of Cryptology. 2018. Vol. 32. No. 2. pp. 265-323.
GOST all authors (up to 50) Copy
Hazay C., Mikkelsen G. L., Rabin T., Toft T., Nicolosi A. A. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting // Journal of Cryptology. 2018. Vol. 32. No. 2. pp. 265-323.
RIS |
Cite this
RIS Copy
TY - JOUR
DO - 10.1007/s00145-017-9275-7
UR - https://doi.org/10.1007/s00145-017-9275-7
TI - Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
T2 - Journal of Cryptology
AU - Hazay, Carmit
AU - Mikkelsen, Gert Læssøe
AU - Rabin, Tal
AU - Toft, Tomas
AU - Nicolosi, Angelo Agatino
PY - 2018
DA - 2018/02/05
PB - Springer Nature
SP - 265-323
IS - 2
VL - 32
SN - 0933-2790
SN - 1432-1378
ER -
BibTex |
Cite this
BibTex (up to 50 authors) Copy
@article{2018_Hazay,
author = {Carmit Hazay and Gert Læssøe Mikkelsen and Tal Rabin and Tomas Toft and Angelo Agatino Nicolosi},
title = {Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting},
journal = {Journal of Cryptology},
year = {2018},
volume = {32},
publisher = {Springer Nature},
month = {feb},
url = {https://doi.org/10.1007/s00145-017-9275-7},
number = {2},
pages = {265--323},
doi = {10.1007/s00145-017-9275-7}
}
MLA
Cite this
MLA Copy
Hazay, Carmit, et al. “Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.” Journal of Cryptology, vol. 32, no. 2, Feb. 2018, pp. 265-323. https://doi.org/10.1007/s00145-017-9275-7.
Found error?