About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

Pairing based threshold cryptography improving on Libert-Quisquater and Baek-Zheng

From

University College London1

Department of Mathematics, Technical University of Denmark2

In this paper we apply techniques from secret sharing and threshold decryption to show how to properly design an ID-based threshold system in which one assumes no trust in any party. In our scheme: We avoid that any single machine ever knew the master secret s of the trusted authority (TA). Instead only shares of it will be known by parties of the distributed TA and it can be seen as a virtual key.

The threshold t(TA) and the number of shareholders n(TA) used by the distributed TA do not need to be identical to the ones used by user ID. Moreover, each user ID can use its own values for the threshold t(i) and the number of parties n(i) that will acquire shares. No single machine will ever know the secret key of the user - this means no single machine in the distributed TA and no shareholder of the user ID and Dot ID itself.

Like Baek and Zheng suggest, such a scheme can be turned into a mediated system.

Language: English
Publisher: Springer
Year: 2006
Pages: 154-159
Proceedings: Financial Cryptography 2006
Series: Lecture Notes in Computer Science
ISBN: 3540462554 , 3540462562 , 9783540462552 and 9783540462569
ISSN: 03029743
Types: Conference paper
DOI: 10.1007/11889663_12

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis