Journal of Cryptology, volume 32, issue 2, pages 265-323
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
2
The Alexandra Institute, Aarhus, Denmark
|
3
IBM T.J. Watson Research Center, Yorktown heights, USA
|
4
Partisia, Aarhus N, Denmark
|
5
YanchWare, Brædstrup, Denmark
|
Publication type: Journal Article
Publication date: 2018-02-05
Journal:
Journal of Cryptology
Q1
Q1
SJR: 1.433
CiteScore: 7.1
Impact factor: 2.3
ISSN: 09332790, 14321378
Computer Science Applications
Applied Mathematics
Software
Abstract
The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite with security against malicious behavior. Our second contribution is a complete Paillier (in: EUROCRYPT, pp 223–238, 1999) threshold encryption scheme in the two-party setting with security against malicious attacks. We further describe how to extend our protocols to the multiparty setting with dishonest majority. Our RSA key generation protocol is comprised of the following subprotocols: (i) a distributed protocol for generation of an RSA composite and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite for the public key and is comprised of the following subprotocols: (i) a distributed generation of the corresponding secret key shares and (ii) a distributed decryption protocol for decrypting according to Paillier.
Found
Found
Top-30
Journals
2
4
6
8
10
12
|
|
Lecture Notes in Computer Science
12 publications, 27.91%
|
|
IEEE Transactions on Information Forensics and Security
3 publications, 6.98%
|
|
ACM Transactions on Internet Technology
2 publications, 4.65%
|
|
Journal of Cryptology
2 publications, 4.65%
|
|
Security and Safety
1 publication, 2.33%
|
|
IET Communications
1 publication, 2.33%
|
|
Symmetry
1 publication, 2.33%
|
|
Computers, Materials and Continua
1 publication, 2.33%
|
|
Internet Technology Letters
1 publication, 2.33%
|
|
IEEE Transactions on Vehicular Technology
1 publication, 2.33%
|
|
Wireless Communications and Mobile Computing
1 publication, 2.33%
|
|
Security and Communication Networks
1 publication, 2.33%
|
|
IEEE Transactions on Circuits and Systems for Video Technology
1 publication, 2.33%
|
|
International Journal of Information Security
1 publication, 2.33%
|
|
Advances in Digital Crime, Forensics, and Cyber Terrorism
1 publication, 2.33%
|
|
Electronics (Switzerland)
1 publication, 2.33%
|
|
Wireless Networks
1 publication, 2.33%
|
|
IEEE Transactions on Cloud Computing
1 publication, 2.33%
|
|
Computer Communications
1 publication, 2.33%
|
|
Theoretical Computer Science
1 publication, 2.33%
|
|
2
4
6
8
10
12
|
Publishers
2
4
6
8
10
12
14
16
|
|
Springer Nature
16 publications, 37.21%
|
|
Institute of Electrical and Electronics Engineers (IEEE)
9 publications, 20.93%
|
|
Association for Computing Machinery (ACM)
6 publications, 13.95%
|
|
MDPI
2 publications, 4.65%
|
|
Hindawi Limited
2 publications, 4.65%
|
|
Elsevier
2 publications, 4.65%
|
|
EDP Sciences
1 publication, 2.33%
|
|
Institution of Engineering and Technology (IET)
1 publication, 2.33%
|
|
Tech Science Press
1 publication, 2.33%
|
|
Wiley
1 publication, 2.33%
|
|
IGI Global
1 publication, 2.33%
|
|
2
4
6
8
10
12
14
16
|
- We do not take into account publications without a DOI.
- Statistics recalculated only for publications connected to researchers, organizations and labs registered on the platform.
- Statistics recalculated weekly.
Are you a researcher?
Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
Cite this
GOST |
RIS |
BibTex |
MLA
Cite this
GOST
Copy
Hazay C. et al. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting // Journal of Cryptology. 2018. Vol. 32. No. 2. pp. 265-323.
GOST all authors (up to 50)
Copy
Hazay C., Mikkelsen G. L., Rabin T., Toft T., Nicolosi A. A. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting // Journal of Cryptology. 2018. Vol. 32. No. 2. pp. 265-323.
Cite this
RIS
Copy
TY - JOUR
DO - 10.1007/s00145-017-9275-7
UR - https://doi.org/10.1007/s00145-017-9275-7
TI - Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
T2 - Journal of Cryptology
AU - Hazay, Carmit
AU - Mikkelsen, Gert Læssøe
AU - Rabin, Tal
AU - Toft, Tomas
AU - Nicolosi, Angelo Agatino
PY - 2018
DA - 2018/02/05
PB - Springer Nature
SP - 265-323
IS - 2
VL - 32
SN - 0933-2790
SN - 1432-1378
ER -
Cite this
BibTex (up to 50 authors)
Copy
@article{2018_Hazay,
author = {Carmit Hazay and Gert Læssøe Mikkelsen and Tal Rabin and Tomas Toft and Angelo Agatino Nicolosi},
title = {Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting},
journal = {Journal of Cryptology},
year = {2018},
volume = {32},
publisher = {Springer Nature},
month = {feb},
url = {https://doi.org/10.1007/s00145-017-9275-7},
number = {2},
pages = {265--323},
doi = {10.1007/s00145-017-9275-7}
}
Cite this
MLA
Copy
Hazay, Carmit, et al. “Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.” Journal of Cryptology, vol. 32, no. 2, Feb. 2018, pp. 265-323. https://doi.org/10.1007/s00145-017-9275-7.