Abstract
A coalition is understood to be a group of participants (coalitionists) who can collaborate in order to achieve common objectives. The basic principle of a coalition is the absence of a threat to communication flows within the coalition from its participants. In this paper, two new RSA coalition protocols are considered. According to the first protocol, only one participant in a coalition (called its leader) generates an RSA scheme for the other participants. In this case, an ordinary participant should send only one arbitrary number to the leader over a secure channel. In the other version, the general parameters of the RSA scheme being used are transmitted from the leader to a participant over a secure channel. This makes it possible to use very small keys and to substantially increase the data rate.
Similar content being viewed by others
REFERENCES
Coalition Networking, Signal AFCEA's International Journal, October, 86 (2000).
A. Menezes,P.van Oorschot, andS. Vanstone, Handbook of Applied Cryptography, Chapter 12, CRC Press (1997).
W. Diffie andM. E. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theory, IT-22, 644–654 (1976).
T. El-Gamal, “A public key cryptosystem and a signature scheme based on discrete logarithm,” IEEE Trans. Inf. Theory, IT-31, 469–472 (1985).
A. Shamir, “How to share a secret,” Comm. ACM, 22, 612–613 (1979).
R. Rivest,A. Shamir, andL. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Comm. ACM, 21, No. 2, 120–126 (1978).
M. Pollard, “Theorems on factorization and primality testing,” Cambridge Philos. Soc., 521–528 (1974).
H. C. Williams, “A p +1 method of factoring,” Math. Comput., 225–234 (1982).
J. Gordon, “Strong primes are easy to find,” in: Cryptology Proceedings of EUROCRYPT 84 (LNCS 209), 216–223 (1985).
M. O. Rabin, Digital Signatures and Public-Key Functions as Intractable as Factorization, Technical Report MIT MIT/LCS, No. TR 212 (1978).
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Anisimov, A.V. Coalition Public-Key Cryptosystems. Cybernetics and Systems Analysis 37, 1–12 (2001). https://doi.org/10.1023/A:1016610214445
Issue Date:
DOI: https://doi.org/10.1023/A:1016610214445