Chapter

Public Key Cryptography

Volume 1992 of the series Lecture Notes in Computer Science pp 300-316

Date:

One Round Threshold Discrete-Log Key Generation without Private Channels

  • Pierre-Alain FouqueAffiliated withDépartement d'Informatique, École Normale Supérieure
  • , Jacques SternAffiliated withDépartement d'Informatique, École Normale Supérieure

Abstract

Pedersen designed the first scheme for generating Discrete- Log keys without any trusted dealer in 1991. As this protocol is simple and efficient, it appeared to be very attractive. For a long time, this robust algorithm has been trusted as being secure. However, in 1999, Gennaro et al. proved that one of the requirements is not guaranteed : more precisely, the property that the key is uniformly distributed in the key space. Their main objective was to repair the security flaw without sacrificing on efficiency. As a result, the protocol became secure but somehow unpractical. In particular, the “complaint phase”, in which cheaters are thrown out, makes the scheme overly complex and difficult to deal with in practical situations. In order to avoid this phase and other drawbacks such as the initialization phase where private channels have to be created, we present a one round scheme which generates a discrete-log key with public channels only. Finally, we show how to improve the efficiency of our algorithm when the number of servers increases.

Key words

Threshold DLK Generation Publicly Verifiable Encryption Adaptive and Concurrent Adversary