Distributing the Encryption and Decryption of a Block Cipher

  • Authors:
  • Keith M. Martin;Rei Safavi-Naini;Huaxiong Wang;Peter R. Wild

  • Affiliations:
  • Information Security Group, Royal Holloway, University of London, Surrey, UK TW20 0EX;School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia 2522;Department of Computing, Macquarie University, North Ryde, Australia 2109;Information Security Group, Royal Holloway, University of London, Surrey, UK TW20 0EX

  • Venue:
  • Designs, Codes and Cryptography
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitives across a number of nodes in order to relax trust assumptions on individual nodes, as well as to introduce a level of fault-tolerance against node compromise. Most threshold cryptography has previously looked at the distribution of public key primitives, particularly threshold signatures and threshold decryption mechanisms. In this paper, we look at the application of threshold cryptography to symmetric primitives, and in particular the encryption or decryption of a symmetric key block cipher. We comment on some previous work in this area and then propose a model for shared encryption / decryption of a block cipher. We will present several approaches to enable such systems and will compare them.