Optimal-resilience, proactive, public-key cryptographic system a

Cryptography – Particular algorithmic function encoding – Public key

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380286, 380 28, 713180, H04L 908, H04L 930

Patent

active

060350415

ABSTRACT:
Proactive robust threshold schemes are presented for general "homomorphic-type" public key systems, as well as optimized systems for the RSA function. Proactive security employs dynamic memory refreshing and enables us to tolerate a "mobile adversary" that dynamically corrupts the components of the systems (perhaps all of them) as long as the number of corruptions (faults) is bounded within a time period. The systems are optimal-resilience. Namely they withstand any corruption of minority of servers at any time-period by an active (malicious) adversary (i.e., any subset less than half. Also disclosed are general optimal-resilience public key systems which are "robust threshold" schemes (against stationary adversary), and are extended to "proactive" systems (against the mobile one). The added advantage of proactivization in practical situations is the fact that, in a long-lived threshold system, an adversary has a long time (e.g., years) to break into any t out of the l servers. In contrast, the adversary in a proactive systems has only a short period of time (e.g., a week) to break into any t servers. The model of mobile adversary seems to be crucial to such "long-lived" systems that are expected to span the secure network and electronic commerce infrastructure.

REFERENCES:
patent: 4888801 (1989-12-01), Foster et al.
patent: 5005200 (1991-04-01), Fischer
patent: 5224163 (1993-06-01), Gasser et al.
patent: 5412723 (1995-05-01), Canetti et al.
patent: 5469507 (1995-11-01), Canetti et al.
patent: 5481613 (1996-01-01), Ford et al.
patent: 5495532 (1996-02-01), Killian et al.
patent: 5588061 (1996-12-01), Ganesan et al.
patent: 5625692 (1997-04-01), Herzberg et al.
patent: 5708714 (1998-01-01), Lopez et al.
patent: 5764767 (1998-06-01), Beimel et al.
patent: 5867578 (1999-02-01), Brickell et al.
Paul Feldman "A Practical Scheme for Non-Interactive Verifiable Secret Sharing" Proceedings of the 28th IEEE Symposium on Foundations of Computer Science (pp. 427-437) 1987.
Desmedt, Y. et al., "Shared Generation of Authenticators and Signatures", Crypto '91, Lecture Notes in Computer Science pp. 457-469, Springer-Verlag 1992 (J. Feigenbaum Ed.).
(1) Yvo Desmedt and Yair Frankel, Shared generation of authenticators and signatures (Extended Abstract), EE & CS Department, University of Wisconsin-Milwaukee, Milwaukee, WI 53202 pp. 457-469, at desmedt@cs.uwm.edu/yair@cs.uwm.edu.
(2) Yair Frankel et al., Non-existence of homomorphic general sharing schemes for some key spaces, (Extended Abstract), EE & CS Department, University of Wisconsin-Milwaukee, Milwaukee; WI 53202, pp. 549-557, at yair@cs.uwm.edu.
(3) Yair Frankel et al, On the risk of disruption in several multiparty signature schemes, (Extended Abstract), EE & CS Department, University of Wisconsin-Milwaukee, Milwaukee, WI 53202 pp. 1-10, May 5, 1996.
(4) Markus Michels et al. GOST 34.10 A Brief Overview of Russia's DSA, Theoretical Computer Science and Information Security, University of Technology Chemnitz, D-09111, Chemnitz, Germany, pp. 1-4, Aug. 21, 1995 at {mmi,hpe}@compuserve.com.
(5) Kaisa Nyberg and Rainer A. Rueppel, Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem, Prinz Eugen-Strasse 18/6, A-1040 Vienna, Austria, pp. 1-15, Jul. 21, 1994.
(6) Susan K. Langford, Weaknesses in Some Threshold Cryptosystems, Atalla Corporation, 2304 Zanker Road, San Jose, CA 95131, e-mail: langford.sub.- susan@tandem,com, pp. 1-9.
(7) L. Harn, Group-oriented (t,n) threshold digital signature scheme and digital multisignature, IEE, Tech. vol. 141 No. 3, Sep. 1994.
(8) Bob Blakley et al., Threshold Schemes With Disenrollment, Entry Systems Division, IBM Corporation, Austin TX 78758, pp. 541-548.
(9) G.R. Blakley and G.A. Kabatianski, On General Perfect Secret Sharing Schemes, Department of Mathematics, Texas A&M University, USA, e-mail blakeley@math.tamu.edu. pp. 367-371.
(10) Cryptography and coding, edited by Henry J. Beker and F.C. Piper, Clarendon Press, Oxford, 1989, Article of R.A. Croft and S.P. Harris, Public-Key Cryptography and Re-Usable Shared Secrets, pp. 189-201.
(11) Torben Pryds Pedersen; A threshold Cryptosystem Without a Trusted Party, Aarhus University, Computer Science Department, Ny Munkegade, DK-8000, Arhus C, Denmark, pp. 522-526.
(12) Yvo G. Desmedt, Threshold Cryptography, EE & CS Department, University of Wisconsin, Milwaukee, WI 53201-0784, USA, pp. 35/449-43/457, ETT, vol. 5 No. 4, Jul.-Aug. 1994.
(13) Yair Frankel, A Practical protocol for Large Greoup Oriented Networks, Electrical Engineering and Computer Science Department, University of Wisconsin-Milwaukee, Milwaukee, WI 53201, pp. 56-61.
(14) Cryptography and coding edited by Henry J. Becker and F.C. Piper, Claredon Press, Oxford, 1989, Article of C. Boyd, Digital Multisignatures, pp. 241-246.
(15)Chin-Chen Chang and Horng-Chin Lee, A New Generalized Group-Oriented Cryptoscheme Without Trusted Centers, IEEE Journal on Selected Areas in Communications, vol. 11, No. 5, pp. 725-729, Jun. 1993.
(16) Chuan-Ming Li et al., Remark on the Threshold RSA Signature Scheme, Institute of Information Engineering, National Cheng-Kung University, Tainan, Taiwan, R.O.C., pp. 413-419.
(17) Torben Pryds Pedersen, Distributed Provers with Applications to Undeniable Signatures, Aarhus University, Computer Science Department, Ny Munkegade, DK-8000, Arhus C, Denmark, pp. 221-242.
(18) Michael K. Reiter and Kenneth P. Birman, How To Securely Replicate Services, AT&T Bell Laboratories, Room 4F-637, 101 Crawfords Corner Road, Holmdel, NJ 07733, e-mail: reiter@research,att.com, pp. 986-1009, ACM Transactions on Programming Language and Systems, vol. 16 No. 3, May 1994.
(19) Yvo G. Desmedt and Yair Frankel, Homomorphic Zero-Knowledge threshold Schemes Over Any Finite Abelian Group, Siam J. Disc. Math, vol. 7, No. 4, pp. 667-679, Nov. 1994.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Optimal-resilience, proactive, public-key cryptographic system a does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Optimal-resilience, proactive, public-key cryptographic system a, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Optimal-resilience, proactive, public-key cryptographic system a will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-370028

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.