Information Technology Reference
In-Depth Information
2.1 Setup Phase
In this phase,
generates its pre-key, the public key shared by the group, as
well as helps the members of G to generate their private keys [19].
T
Pre-key generation. T
generates its pre-key as follows:
1.
T
chooses two large primes p and q , such that
p = u 1 ·
r
·
p 1 +1 ,
q = u 2 ·
r
·
q 1 +1 ,
where r, p 1 ,q 1 are prime numbers, u 1 ,u 2 Z
with gcd( u 1 ,u 2 ) = 2, that is,
u 1 =2 v 1 , u 2 =2 v 2 ,andgcd( v 1 ,v 2 )=1.
In order to guarantee the security of the scheme, the bitlength of r is selected
so that the Subgroup Discrete Logarithm Problem (SDLP) of order r in
Z n
be computationally infeasible.
2.
T
computes
n = p
·
q,
r 2
φ ( n )=( p
1)( q
1) = u 1 ·
u 2 ·
·
p 1 ·
q 1 ,
φ ( n )
λ ( n )=lcm( p
1 ,q
1) =2 v 1 ·
v 2 ·
r
·
p 1 ·
q 1 ,
1) =
gcd( p
1 ,q
where φ ( n ) is the Euler function, λ ( n ) is the Carmichael function, and lcm
represents the least common multiple.
Then,
Z n
T
selects an element α
with multiplicative order r modulo n ,
such that
r 2
gcd( α, φ ( n )) = gcd( α, u 1 ·
u 2 ·
·
p 1 ·
q 1 )=1 .
Note that this element, α , can be eciently computed as
knows the fac-
torization of n and consequently it knows φ ( n )and λ ( n ) [19, Lemma 3.1].
We denote by S r
T
Z n generated by α .
the subgroup of
Z r
3.
T
generates a secret random number s
and determines
β = α s
(mod n ) .
(1)
4.
T
publishes the values ( α, r, β, n ); whereas it keeps secret the values of
( p, q, s ).
With the previous hypothesis, the security of
's secret, s , is based on the Integer
Factorization Problem (IFP) and on the Subgroup Discrete Logarithm Problem
(SDLP).
T
Key generation. In order to determine the private keys of the members of G ,
T
computes its private key and the public key which will be shared by all the
signers of G .
 
Search WWH ::




Custom Search