The Library
1-round distributed key generation with efficient reconstruction using decentralized CP-ABE
Tools
Zhang, Liang, Qiu, Feiyang, Hao, Feng and Kan, Haibin (2022) 1-round distributed key generation with efficient reconstruction using decentralized CP-ABE. IEEE Transactions on Information Forensics and Security, 17 . pp. 894-907. doi:10.1109/TIFS.2022.3152356 ISSN 1556-6013.
|
PDF
WRAP-1-round-distributed-key-generation-efficient-reconstruction-using-decentralized-CP-ABE-Hao-2021.pdf - Accepted Version - Requires a PDF viewer. Download (479Kb) | Preview |
Official URL: https://doi.org/10.1109/TIFS.2022.3152356
Abstract
Distributed key generation (DKG) is widely used in multi-party computation and decentralized applications. DKG has two phases, namely sharing and reconstruction. Most of the prior DKG protocols need at least 2 rounds for the sharing phase, in case some party raises a dispute. The existing 1-round DKG protocol [Fouque et al., PKC’01], built based on a publicly verifiable secret sharing (PVSS) scheme, assumes a static adversary model and its reconstruction phase requires O(n2) communication complexity. Motivated by the observation that a ciphertext-policy attribute-based encryption (CP-ABE) scheme hides secret sharing (SS) in ciphertext, we utilize decentralized CP-ABE to achieve the first adaptively secure 1-round DKG protocol. Firstly, a CP-ABE scheme enables the ciphertexts in DKG to be externally decrypted, making our protocol superior to the PVSS-based DKG protocol in reconstruction. The communication and computation complexities are both lowered to O(n) thanks to the constant-sized decryption key and the proposed batch decryption. The use of CP-ABE also makes our DKG protocol storage-friendly, i.e., the parties store no ciphertext after the sharing phase. Secondly, we add non-interactive zero-knowledge (NIZK) proofs to make the CP-ABE ciphertext publicly verifiable by leveraging the sigma protocol and the Fiat-Shamir heuristic. Thirdly, we demonstrate our protocol’s feasibility by presenting a proof-of-concept implementation over Ethereum, which is used as a public channel and a trustworthy computation platform. The implementation is a non-trivial task due to Ethereum’s incompatibility with the bilinear mapping group.
Item Type: | Journal Article | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Subjects: | Q Science > Q Science (General) Q Science > QA Mathematics Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software |
|||||||||||||||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | |||||||||||||||||||||
Library of Congress Subject Headings (LCSH): | Data encryption (Computer science) , Machine learning , Computational complexity , Computers -- Access control, Cryptography | |||||||||||||||||||||
Journal or Publication Title: | IEEE Transactions on Information Forensics and Security | |||||||||||||||||||||
Publisher: | IEEE | |||||||||||||||||||||
ISSN: | 1556-6013 | |||||||||||||||||||||
Official Date: | 16 February 2022 | |||||||||||||||||||||
Dates: |
|
|||||||||||||||||||||
Volume: | 17 | |||||||||||||||||||||
Page Range: | pp. 894-907 | |||||||||||||||||||||
DOI: | 10.1109/TIFS.2022.3152356 | |||||||||||||||||||||
Status: | Peer Reviewed | |||||||||||||||||||||
Publication Status: | Published | |||||||||||||||||||||
Reuse Statement (publisher, data, author rights): | © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |||||||||||||||||||||
Access rights to Published version: | Restricted or Subscription Access | |||||||||||||||||||||
Date of first compliant deposit: | 21 February 2022 | |||||||||||||||||||||
Date of first compliant Open Access: | 22 February 2022 | |||||||||||||||||||||
RIOXX Funder/Project Grant: |
|
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year