Abstract
Threshold Cryptography (distributed key splitting) is traditionally employed as means to preserve the whole key against compromise, i.e., for risk reduction (coping with memory compromise) and availability (coping with denial of service). Recently, some functionality of splitting keys has been shown to be useful beyond preservation, yielding a small number of high-security, server-related applications. However, the business applications and market applicability of splitting keys is still not realized or analyzed. The goal of this position paper is to put forth the thesis that the full power of threshold cryptography as a useful and attractive tool is going to be unleashed only if the ability to split keys is given to end users (the masses). More specifically, we claim that threshold cryptographic operations (e.g. splitting a key) together with user capability to delegate (which we view as a necessary extension of PKI) should be part of the suite of operations available to end-users of a PKI (e.g., embe dded in user crypto-APIs / user smartcards). This new tool (“split and delegate”) will enable flexible key management at the user level, in contrast with the traditional rigidity of PKI. We note that threshold cryptography is currently mainly an idea and still not in the market (though some companies do offer split key in hardware or software). We believe that the economic value of the suggested user-based applications will be the central driving force behind any market adoption of threshold cryptography. We give an analysis of the potential business and of market penetration scenarios (such business analysis of suggested new cryptographic applications is often done but rarely published).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
B. Barak, A. Herzberg, D. Naor and E. Shai. The Proactive Security Toolkit and Applications. ACM CCS’ 99.
D. Boneh, X. Ding, G. Tsudik and M. Wong. A Method for Fast Revocation of Public-Key Certificates and Security Capabilities. 10th Usenix’ 01.
C. Boyd. Digital Multisignatures. In H. Baker and F. Piper, eds., Cryptography and Coding, Clarendon Press, 1989.
R. Cramer, R. Gennaro and B. Schoenmakers. A Secure and Optimally Efficient Multi-Authority Election Scheme. Eurocrypt’ 97.
D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. CACM Feb’ 81.
A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung. How to Share a Function Securely. STOC’ 94.
Y. Desmedt. Society and Group-Oriented Cryptography: A New Concept. Crypto’ 87.
Y. Desmedt and Y. Frankel. Threshold Cryptosystems. Crypto’ 89.
Y. Desmedt and Y. Frankel. Shared Generation of Authenticators and Signatures. Crypto’ 91.
Y. Desmedt and S. Jajodia. Redistributing Secret Shares to New Access Structures and Its Applications, manuscript.
C. Ellison, B. Prantz, B. Lampson, R. Rivest, B. Thomas and T. Ylonen. SPKI Certificate Theory. Internet Network Working Group RFC 2693, Sep.’ 99.
Y. Frankel. A Practical Protocol for Large Group-Oriented Networks. Eurocrypt’ 89.
Y. Frankel, P. Gemmell, P. MacKenzie, and M. Yung. Proactive RSA. Crypto’ 97.
Y. Frankel, P. Gemmell, P. MacKenzie, and M. Yung. Optimal-Resilience Proactive Public-Key Cryptography. FOCS’ 97.
Y. Frankel and M. Yung. “Dynamic Fault”-Robust Cryptosystems Meet Organizational Needs for Dynamic Control. Financial Cryptography’ 99.
S. Garfinkel, PGP: Pretty Good Privacy. O’Reilly, 1994.
A. Herzberg, M. Jakobsson, S, Jarecki, H. Krawczyk, and M. Yung. Proactive Public Key and Signature Systems. CCS’ 97.
M. Jakobsson. On Quorum Controlled Asymmetric Proxy Re-encryption, PKC’ 99.
M. Jakobsson and M. Yung. Magic-ink signatures, Eurocrypt’ 97.
L. Lessig. Code: And Other Laws of Cyberspace. Basic Books, 2000.
M. Mambo, K Usuda and E. Okamoto. Proxy Signatures for Delegated Signing Operation. ACM CCS’ 96.
R. Ostrovsky and M. Yung. How to Withstand Mobile Virus Attacks. PODC’ 91.
SET Secure Electronic Transaction Specification, Book 3 Protocol Definition, v1.0’ 97. http://www.setco.org/download/set_bk3.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 IFCA/Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Geer, D.E., Yung, M. (2003). Split-and-Delegate: Threshold Cryptography for the Masses. In: Blaze, M. (eds) Financial Cryptography. FC 2002. Lecture Notes in Computer Science, vol 2357. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36504-4_16
Download citation
DOI: https://doi.org/10.1007/3-540-36504-4_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00646-6
Online ISBN: 978-3-540-36504-4
eBook Packages: Springer Book Archive