A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret

12/19/2019
by   Xiaojuan Dong, et al.
0

The modified Paillier cryptosystem has become extremely popular and applied in many fields, owning to its additive homomorphism. This cryptosystem provides weak private keys and a strong private key. A weak private key only can decrypt ciphertexts under the corresponding public key. The strong private key can decrypt all ciphertexts even under different public keys. When the modified Paillier cryptosystem is applied in a system, the member, often the system administrator, has the strong private key and can decrypt all ciphertexts. If this system administrator is attacked or compromised, the security of the application system absolutely break down. Thus, it is important to stop the decryption of the strong private key. To address this issue, we propose an restrained version of the modified Paillier cryptosystem (Restrained-Paillier), by endowing the multiplicative homomorphism. We perform the additive encryption on the multiplicative ciphertext and generate the mixed ciphertext, which can not be decrypted by the strong private key. Based on this Restrained-Paillier, we develop two applications. Firstly, we realize access control of common secret of two owners. In our scheme, only one owner cannot access secret. Secondly, we present three protocols for identity distribution and key management, identity authentication and private key recovery. Security analysis shows that the Restrained-Paillier cryptosystem can resist the chosen plaintext attack. The experimental results illustrate the utility and efficiency of the proposed protocols.

READ FULL TEXT

page 2

page 3

page 4

page 5

page 7

page 8

page 9

page 10

research
09/19/2022

An Owner-managed Indirect-Permission Social Authentication Method for Private Key Recovery

In this paper, we propose a very secure and reliable owner-self-managed ...
research
04/12/2022

Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication

Public key authentication (PKA) has been deployed in various services to...
research
08/11/2023

Security of XCB and HCTR

Tweakable Enciphering Scheme (TES) is a length preserving scheme which p...
research
11/15/2020

Removable Weak Keys for Discrete Logarithm Based Cryptography

We describe a novel type of weak cryptographic private key that can exis...
research
02/28/2023

Publicly verifiable delegative democracy with secret voting power

We use a commitment scheme to track every individual's voting power on a...
research
05/28/2019

EncryptGAN: Image Steganography with Domain Transform

We propose an image steganographic algorithm called EncryptGAN, which di...
research
09/15/2021

Private Attacks in Longest Chain Proof-of-stake Protocols with Single Secret Leader Elections

Single Secret Leader Elections have recently been proposed as an improve...

Please sign up or login with your details

Forgot password? Click here to reset