Abstract
In this paper we apply techniques from secret sharing and threshold decryption to show how to properly design an ID-based threshold system in which one assumes no trust in any party.
In our scheme:
We avoid that any single machine ever knew the master secret s of the trusted authority (TA). Instead only shares of it will be known by parties of the distributed TA and it can be seen as a virtual key.
The threshold t(TA) and the number of shareholders n(TA) used by the distributed TA do not need to be identical to the ones used by user ID. Moreover, each user ID can use its own values for the threshold t(i) and the number of parties n(i) that will acquire shares.
No single machine will ever know the secret key of the user - this means no single machine in the distributed TA and no shareholder of the user ID and Dot ID itself.
Like Baek and Zheng suggest, such a scheme can be turned into a mediated system.
Original language | English |
---|---|
Title of host publication | Financial Cryptography and Data Security |
Publisher | Springer |
Publication date | 2006 |
Pages | 154-159 |
ISBN (Print) | 978-3-540-46255-2 |
DOIs | |
Publication status | Published - 2006 |
Event | 10th Financial Cryptography and Data Security - Paradise Cove, West End Village, Anguilla Duration: 1 Jan 2006 → … Conference number: 10 |
Conference
Conference | 10th Financial Cryptography and Data Security |
---|---|
Number | 10 |
Location | Paradise Cove |
Country/Territory | Anguilla |
City | West End Village |
Period | 01/01/2006 → … |
Series | Lecture Notes in Computer Science |
---|---|
Number | 4107 |
ISSN | 0302-9743 |