TY - JOUR
T1 - Distributing the encryption and decryption of a block cipher
AU - Martin, Keith M.
AU - Safavi-Naini, Rei
AU - Wang, Huaxiong
AU - Wild, Peter R.
PY - 2005/10
Y1 - 2005/10
N2 - In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitives across a number of nodes in order to relax trust assumptions on individual nodes, as well as to introduce a level of fault-tolerance against node compromise. Most threshold cryptography has previously looked at the distribution of public key primitives, particularly threshold signatures and threshold decryption mechanisms. In this paper, we look at the application of threshold cryptography to symmetric primitives, and in particular the encryption or decryption of a symmetric key block cipher. We comment on some previous work in this area and then propose a model for shared encryption / decryption of a block cipher. We will present several approaches to enable such systems and will compare them.
AB - In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitives across a number of nodes in order to relax trust assumptions on individual nodes, as well as to introduce a level of fault-tolerance against node compromise. Most threshold cryptography has previously looked at the distribution of public key primitives, particularly threshold signatures and threshold decryption mechanisms. In this paper, we look at the application of threshold cryptography to symmetric primitives, and in particular the encryption or decryption of a symmetric key block cipher. We comment on some previous work in this area and then propose a model for shared encryption / decryption of a block cipher. We will present several approaches to enable such systems and will compare them.
UR - http://www.scopus.com/inward/record.url?scp=22144483110&partnerID=8YFLogxK
U2 - 10.1007/s10623-003-1719-4
DO - 10.1007/s10623-003-1719-4
M3 - Article
AN - SCOPUS:22144483110
SN - 0925-1022
VL - 36
SP - 263
EP - 287
JO - Designs, Codes and Cryptography
JF - Designs, Codes and Cryptography
IS - 3
ER -