Abstract
In a threshold cryptosystem n members share the secret key of an organization such that k members (1≤k≤n) must cooperate in order to decipher a given ciphertext. In this note it is shown how to implement such a scheme without having a trusted party, which selects the secret key and distributes it to the members. In stead, the members choose the secret key and distribute it verifiably among themselves. Subsequently, this key can be used for authentication as well as secret communication.
Chapter PDF
Similar content being viewed by others
References
Y. Desmedt. Society and group oriented cryptography: A new concept. In Advances in Cryptology-proceedings of CRYPTO 87, Lecture Notes in Computer Science, pages 120–127, 1988.
Y. Desmedt and Y. Frankel. Threshold cryptosystems. In Advances in Cryptology-proceedings of CRYPTO 89, Lecture Notes in Computer Science, pages 307–315, 1990.
T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In Advances in Cryptology-proceedings of CRYPTO 84, Lecture Notes in Computer Science. Springer-Verlag, 1985.
Y. Frankel. A practical protocol for large group oriented networks. In Advances in Cryptology-proceedings of EUROCRYPT 89, Lecture Notes in Computer Science, pages 56–61. Springer-Verlag, 1990.
T. Hwang. Cryptosystem for group oriented cryptography. In Advances in Cryptology-proceedings of EUROCRYPT 90, Lecture Notes in Computer Science, pages 352–360. Springer-Verlag, 1991.
I. Ingemarsson and G. J. Simmons. A protocol to set up shared secret schemes without the assistance of a mutually trusted party. In Advances in Cryptology-proceedings of EUROCRYPT 90, Lecture Notes in Computer Science, pages 266–282. Springer-Verlag, 1991.
A. Shamir. How to share a secret. CACM, 22:612–613, 1979.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pedersen, T.P. (1991). A Threshold Cryptosystem without a Trusted Party. In: Davies, D.W. (eds) Advances in Cryptology — EUROCRYPT ’91. EUROCRYPT 1991. Lecture Notes in Computer Science, vol 547. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46416-6_47
Download citation
DOI: https://doi.org/10.1007/3-540-46416-6_47
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-54620-7
Online ISBN: 978-3-540-46416-7
eBook Packages: Springer Book Archive