首页> 外文会议>Annual international cryptology conference >Fast Distributed RSA Key Generation for Semi-honest and Malicious Adversaries
【24h】

Fast Distributed RSA Key Generation for Semi-honest and Malicious Adversaries

机译:针对半诚实和恶意对手的快速分布式RSA密钥生成

获取原文
获取外文期刊封面目录资料

摘要

We present two new, highly efficient, protocols for securely generating a distributed RSA key pair in the two-party setting. One protocol is semi-honestly secure and the other maliciously secure. Both are constant round and do not rely on any specific number-theoretic assumptions and improve significantly over the state-of-the-art by allowing a slight leakage (which we show to not affect security). For our maliciously secure protocol our most significant improvement comes from executing most of the protocol in a "strong" semi-honest manner and then doing a single, light, zero-knowledge argument of correct execution. We introduce other significant improvements as well. One such improvement arrives in showing that certain, limited leakage does not compromise security, which allows us to use lightweight subprotocols. Another improvement, which may be of independent interest, comes in our approach for multiplying two large integers using OT, in the malicious setting, without being susceptible to a selective-failure attack. Finally, we implement our malicious protocol and show that its performance is an order of magnitude better than the best previous protocol, which provided only semi-honest security.
机译:我们介绍了两个新的高效协议,用于在两方设置中安全地生成分布式RSA密钥对。一种协议是半诚实的安全,另一种则是恶意的安全。两者都是不变的回合,并且不依赖于任何特定的数论假设,并且通过允许轻微的泄漏(我们证明不会影响安全性)而在现有技术上有显着改进。对于我们的恶意安全协议,我们最大的改进来自以“强”半诚实的方式执行大多数协议,然后对正确执行进行了一个简单,零知识的说法。我们还引入了其他重大改进。这样的改进之一就是表明某些有限的泄漏不会损害安全性,这使我们可以使用轻量级子协议。另一个值得关注的改进是我们的方法,该方法在恶意环境中使用OT将两个大整数相乘,而不会受到选择失败攻击的影响。最后,我们实现了恶意协议,并表明其性能比以前的最佳协议(仅提供半诚实的安全性)好一个数量级。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号