Title :
Implementation of distributed key generation algorithms using secure sockets
Author :
Chronopoulos, A.T. ; Balbi, F. ; Veljkovic, D. ; Kolani, N.
Author_Institution :
Dept. of Comput. Sci., Texas Univ., San Antonio, TX, USA
Abstract :
Distributed key generation (DKG) protocols are indispensable in the design of any cryptosystem used in communication networks. DKG is needed to generate public/private keys for signatures or more generally for encrypting/decrypting messages. One such DKG (due to Pedersen) has recently been generalized to a provably secure protocol by Gennaro et al. We propose and implement an efficient algorithm to compute the (group generator) parameter g required in the DKG protocol. We also implement the DKG due to Gennaro et al. on a network of computers using secure sockets. We run tests which show the efficiency of the implementation.
Keywords :
computer networks; digital signatures; distributed algorithms; protocols; public key cryptography; telecommunication security; DKG protocols; communication networks; computer network; cryptosystem; digital signatures; distributed key generation algorithms; group generator parameter; message decryption; message encryption; private key generation; provably secure protocol; public key generation; secure sockets; Algorithm design and analysis; Communication networks; Computer networks; Computer science; Cryptography; Network servers; Protocols; Public key; Sockets; Testing;
Conference_Titel :
Network Computing and Applications, 2004. (NCA 2004). Proceedings. Third IEEE International Symposium on
Print_ISBN :
0-7695-2242-4
DOI :
10.1109/NCA.2004.1347807