The Community for Technology Leaders
RSS Icon
Subscribe
Columbus, OH
June 6, 2005 to June 10, 2005
ISBN: 0-7695-2328-5
pp: 815-824
Lidong Zhou , Microsoft Research Silicon Valley
Michael A. Marsh , University of Maryland
Fred B. Schneider , Cornell University
Anna Redz , Royal Institute of Technology
ABSTRACT
A protocol is given to take an ElGamal ciphertext encrypted under the key of one distributed service and produce the corresponding ciphertext encrypted under the key of another distributed service, but without the plaintext ever becoming available. Each distributed service comprises a set of servers and employs threshold cryptography to maintain its service private key. Unlike prior work, the protocol requires no assumptions about execution speeds or message delivery delays. The protocol also imposes fewer constraints on where and when various steps are performed, which can bring improvements in end-to-end performance for some applications (e.g., a trusted publish/subscribe infrastructure.) Two new building blocks employed — a distributed blinding protocol and verifiable dual encryption proofs — could have uses beyond re-encryption protocols.
INDEX TERMS
null
CITATION
Lidong Zhou, Michael A. Marsh, Fred B. Schneider, Anna Redz, "Distributed Blinding for Distributed ElGamal Re-Encryption", ICDCS, 2005, Proceedings. 25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings. 25th IEEE International Conference on Distributed Computing Systems Workshops 2005, pp. 815-824, doi:10.1109/ICDCS.2005.24
14 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool