Distributing the encryption and decryption of a block cipher

Keith M. Martin*, Rei Safavi-Naini, Huaxiong Wang, Peter R. Wild

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

13 Citations (Scopus)

Abstract

In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitives across a number of nodes in order to relax trust assumptions on individual nodes, as well as to introduce a level of fault-tolerance against node compromise. Most threshold cryptography has previously looked at the distribution of public key primitives, particularly threshold signatures and threshold decryption mechanisms. In this paper, we look at the application of threshold cryptography to symmetric primitives, and in particular the encryption or decryption of a symmetric key block cipher. We comment on some previous work in this area and then propose a model for shared encryption / decryption of a block cipher. We will present several approaches to enable such systems and will compare them.

Original languageEnglish
Pages (from-to)263-287
Number of pages25
JournalDesigns, Codes and Cryptography
Volume36
Issue number3
DOIs
Publication statusPublished - Oct 2005

Fingerprint Dive into the research topics of 'Distributing the encryption and decryption of a block cipher'. Together they form a unique fingerprint.

Cite this