Abstract
We recognize the need of certificateless PKI to reduce the step of obtaining the public key. This leads to ID-Based cryptography where we have PKI with full power to generate private keys for any identity. We solve this problem by implementing distributed key generation to form a group of players which will act as private key generator for ID-Based PKI. The implementation is done on the Android platform, showing the possibilities of running PKI on cheap and widely available hardware.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Please refer to [10] for more extensive overview on IBE schemes and papers.
References
Backes, M., Kate, A., Patra, A.: Computational verifiable secret sharing revisited. In: Proceedings of 17th International Conference on The Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, pp. 590–609. Springer, Berlin (2011). http://dx.doi.org/10.1007/978-3-642-25385-0_32
Blakley, G.: Safeguarding cryptographic keys. In: Proceedings of 1979 AFIPS National Computer Conference, pp. 313–317. AFIPS Press, Monval (1979)
Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Proceedings of 21st Annual International Cryptology Conference on Advances in Cryptology, CRYPTO 2001, pp. 213–229. Springer, London (2001). http://dl.acm.org/citation.cfm?id=646766.704155
Cachin, C., Kursawe, K., Lysyanskaya, A., Strobl, R.: Asynchronous verifiable secret sharing and proactive cryptosystems. In: Proceedings of 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 88–97. ACM, New York (2002). http://doi.acm.org/10.1145/586110.586124
Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults. In: Proceedings of 26th Annual Symposium on Foundations of Computer Science, SFCS 1985, pp. 383–395. IEEE Computer Society, Washington, DC (1985). http://dx.doi.org/10.1109/SFCS.1985.64
Desmedt, Y., Quisquater, J.J.: Public-key systems based on the difficulty of tampering (is there a difference between DES and RSA?). In: Proceedings on Advances in cryptology—CRYPTO 1986, pp. 111–117. Springer, London (1987). http://dl.acm.org/citation.cfm?id=36664.36673
Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: Proceedings of 28th Annual Symposium on Foundations of Computer Science, SFCS 1987, pp. 427–438. IEEE Computer Society, Washington, DC (1987). http://dx.doi.org/10.1109/SFCS.1987.4
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20(1), 51–83 (2007). http://dx.doi.org/10.1007/s00145-006-0347-3
Gennaro, R., Rabin, M.O., Rabin, T.: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In: Proceedings of 17th Annual ACM Symposium on Principles of Distributed Computing, PODC 1998, pp. 101–111. ACM, New York (1998). http://doi.acm.org/10.1145/277697.277716
Joye, M., Neven, G.: Identity-Based Cryptography. Cryptology and Information Security Series, vol. 2. IOS Press, Amsterdam (2008)
Kate, A., Goldberg, I.: Distributed key generation for the internet. In: 29th IEEE International Conference on Distributed Computing Systems, ICDCS 2009, pp. 119–128, June 2009
Maurer, U.M., Yacobi, Y.: Non-interactive public-key cryptography. In: Proceedings of 10th Annual International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT 1991, pp. 498–507. Springer, Berlin (1991). http://dl.acm.org/citation.cfm?id=1754868.1754924
Pedersen, T.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) Advances in Cryptology CRYPTO 1991. Lecture Notes in Computer Science, vol. 576, pp. 129–140. Springer, Berlin (1992). http://dx.doi.org/10.1007/3-540-46766-1_9
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979). http://doi.acm.org/10.1145/359168.359176
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 1984 on Advances in Cryptology, pp. 47–53. Springer-Verlag New York, Inc., New York (1985). http://dl.acm.org/citation.cfm?id=19478.19483
Tanaka, H.: A realization scheme for the identity-based cryptosystem. In: A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, CRYPTO 1987, pp. 340–349. Springer, London (1988). http://dl.acm.org/citation.cfm?id=646752.704736
Tsujii, S., Itoh, T.: An ID-based cryptosystem based on the discrete logarithm problem. IEEE J. Sel. Areas Commun. 7(4), 467–473 (1989). http://dx.doi.org/10.1109/49.17709
Wu, Q., Chen, H., Li, Z., Jia, C.: On a practical distributed key generation scheme based on bivariate polynomials. In: 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp. 1–4, September 2011
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Ribarski, P., Antovski, L. (2018). Distributed Private Key Generator for ID-Based Public Key Infrastructure. In: Stojanov, G., Kulakov, A. (eds) ICT Innovations 2016. ICT Innovations 2016. Advances in Intelligent Systems and Computing, vol 665. Springer, Cham. https://doi.org/10.1007/978-3-319-68855-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-68855-8_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68854-1
Online ISBN: 978-3-319-68855-8
eBook Packages: EngineeringEngineering (R0)