TY - GEN
T1 - Threshold and proactive pseudo-random permutations
AU - Dodis, Yevgeniy
AU - Yampolskiy, Aleksandr
AU - Yung, Moti
N1 - Copyright:
Copyright 2008 Elsevier B.V., All rights reserved.
PY - 2006
Y1 - 2006
N2 - We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP). Our protocol needs only O(1) communication rounds. It tolerates up to (n-1)/2 of n dishonest servers in the semi-honest environment. Many protocols that use PRPs (e.g., a CBC block cipher mode) can now be translated into the distributed setting. Our main technique for constructing invertible threshold PRPs is a distributed Luby-Rackoff construction where both the secret keys and the input are shared among the servers. We also present protocols for obliviously computing pseudo-random functions by Naor-Reingold [41] and Dodis-Yampolskiy [25] with shared input and keys.
AB - We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP). Our protocol needs only O(1) communication rounds. It tolerates up to (n-1)/2 of n dishonest servers in the semi-honest environment. Many protocols that use PRPs (e.g., a CBC block cipher mode) can now be translated into the distributed setting. Our main technique for constructing invertible threshold PRPs is a distributed Luby-Rackoff construction where both the secret keys and the input are shared among the servers. We also present protocols for obliviously computing pseudo-random functions by Naor-Reingold [41] and Dodis-Yampolskiy [25] with shared input and keys.
KW - Distributed Block Ciphers
KW - Distributed Luby-Rackoff Construction
KW - Oblivious Pseudo-Random Functions
KW - Threshold Cryptography
UR - http://www.scopus.com/inward/record.url?scp=33745526470&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33745526470&partnerID=8YFLogxK
U2 - 10.1007/11681878_28
DO - 10.1007/11681878_28
M3 - Conference contribution
AN - SCOPUS:33745526470
SN - 3540327312
SN - 9783540327318
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 542
EP - 560
BT - Theory of Cryptography
T2 - 3rd Theory of Cryptography Conference, TCC 2006
Y2 - 4 March 2006 through 7 March 2006
ER -