【24h】

Threshold MACs

机译:阈值Mac.

获取原文

摘要

The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offs between the anonymity and efficiency of threshold MACs.
机译:在密码系统中共享计算的力量在密码学的几个真实应用中至关重要。已应用阈值密码系统的加密原语和任务包括数字签名,识别,公钥加密和块密码等的变体等。希望扩展阈值加密可以应用的加密原语域。本文研究了阈值消息认证代码(阈值Mac)。阈值密码系统通常使用底层加密基元的代数同态性。构建阈值加密方案的典型方法是将具有代数均质密码原语组合的(线性)秘密共享方案。 MAC缺乏代数特性规定了这样一种分享MAC的方法。在本文中,我们提出了一种使用组合方法获得阈值MAC的方法。我们的方法是通用的,即通过使用某些组合物体(例如无覆盖家族及其变体),它适用于任何安全的传统MAC。我们讨论阈值加密中匿名的问题,这是一个尚未在该领域的文献中尚未解决的主题,我们表明阈值Mac的匿名性和效率之间存在权衡。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号