Skip to main content

Distributed Private Key Generator for ID-Based Public Key Infrastructure

  • Conference paper
  • First Online:
  • 575 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 665))

Abstract

We recognize the need of certificateless PKI to reduce the step of obtaining the public key. This leads to ID-Based cryptography where we have PKI with full power to generate private keys for any identity. We solve this problem by implementing distributed key generation to form a group of players which will act as private key generator for ID-Based PKI. The implementation is done on the Android platform, showing the possibilities of running PKI on cheap and widely available hardware.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Please refer to [10] for more extensive overview on IBE schemes and papers.

References

  1. Backes, M., Kate, A., Patra, A.: Computational verifiable secret sharing revisited. In: Proceedings of 17th International Conference on The Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, pp. 590–609. Springer, Berlin (2011). http://dx.doi.org/10.1007/978-3-642-25385-0_32

  2. Blakley, G.: Safeguarding cryptographic keys. In: Proceedings of 1979 AFIPS National Computer Conference, pp. 313–317. AFIPS Press, Monval (1979)

    Google Scholar 

  3. Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Proceedings of 21st Annual International Cryptology Conference on Advances in Cryptology, CRYPTO 2001, pp. 213–229. Springer, London (2001). http://dl.acm.org/citation.cfm?id=646766.704155

  4. Cachin, C., Kursawe, K., Lysyanskaya, A., Strobl, R.: Asynchronous verifiable secret sharing and proactive cryptosystems. In: Proceedings of 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 88–97. ACM, New York (2002). http://doi.acm.org/10.1145/586110.586124

  5. Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults. In: Proceedings of 26th Annual Symposium on Foundations of Computer Science, SFCS 1985, pp. 383–395. IEEE Computer Society, Washington, DC (1985). http://dx.doi.org/10.1109/SFCS.1985.64

  6. Desmedt, Y., Quisquater, J.J.: Public-key systems based on the difficulty of tampering (is there a difference between DES and RSA?). In: Proceedings on Advances in cryptology—CRYPTO 1986, pp. 111–117. Springer, London (1987). http://dl.acm.org/citation.cfm?id=36664.36673

  7. Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: Proceedings of 28th Annual Symposium on Foundations of Computer Science, SFCS 1987, pp. 427–438. IEEE Computer Society, Washington, DC (1987). http://dx.doi.org/10.1109/SFCS.1987.4

  8. Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20(1), 51–83 (2007). http://dx.doi.org/10.1007/s00145-006-0347-3

  9. Gennaro, R., Rabin, M.O., Rabin, T.: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In: Proceedings of 17th Annual ACM Symposium on Principles of Distributed Computing, PODC 1998, pp. 101–111. ACM, New York (1998). http://doi.acm.org/10.1145/277697.277716

  10. Joye, M., Neven, G.: Identity-Based Cryptography. Cryptology and Information Security Series, vol. 2. IOS Press, Amsterdam (2008)

    Google Scholar 

  11. Kate, A., Goldberg, I.: Distributed key generation for the internet. In: 29th IEEE International Conference on Distributed Computing Systems, ICDCS 2009, pp. 119–128, June 2009

    Google Scholar 

  12. Maurer, U.M., Yacobi, Y.: Non-interactive public-key cryptography. In: Proceedings of 10th Annual International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT 1991, pp. 498–507. Springer, Berlin (1991). http://dl.acm.org/citation.cfm?id=1754868.1754924

  13. Pedersen, T.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) Advances in Cryptology CRYPTO 1991. Lecture Notes in Computer Science, vol. 576, pp. 129–140. Springer, Berlin (1992). http://dx.doi.org/10.1007/3-540-46766-1_9

  14. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979). http://doi.acm.org/10.1145/359168.359176

  15. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 1984 on Advances in Cryptology, pp. 47–53. Springer-Verlag New York, Inc., New York (1985). http://dl.acm.org/citation.cfm?id=19478.19483

  16. Tanaka, H.: A realization scheme for the identity-based cryptosystem. In: A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, CRYPTO 1987, pp. 340–349. Springer, London (1988). http://dl.acm.org/citation.cfm?id=646752.704736

  17. Tsujii, S., Itoh, T.: An ID-based cryptosystem based on the discrete logarithm problem. IEEE J. Sel. Areas Commun. 7(4), 467–473 (1989). http://dx.doi.org/10.1109/49.17709

  18. Wu, Q., Chen, H., Li, Z., Jia, C.: On a practical distributed key generation scheme based on bivariate polynomials. In: 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp. 1–4, September 2011

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pance Ribarski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Ribarski, P., Antovski, L. (2018). Distributed Private Key Generator for ID-Based Public Key Infrastructure. In: Stojanov, G., Kulakov, A. (eds) ICT Innovations 2016. ICT Innovations 2016. Advances in Intelligent Systems and Computing, vol 665. Springer, Cham. https://doi.org/10.1007/978-3-319-68855-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68855-8_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68854-1

  • Online ISBN: 978-3-319-68855-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics