Abstract by anuja a sonalker on Asymmetric Key Distribution


Proof of correct Signature formation


Download 217.42 Kb.
Pdf ko'rish
bet20/43
Sana19.04.2023
Hajmi217.42 Kb.
#1365410
1   ...   16   17   18   19   20   21   22   23   ...   43
Bog'liq
etd

3.5 Proof of correct Signature formation: 
If there are a total of t+1 shares required to make a valid signature coming from t Share 
Servers and one Special Server, the following is true: 
1
 
2
 
3
 
4 … 
 
t+1 



|

S
1 
= M
d

mod N S
2 
= M
d

mod N S
3 
= M
d

mod N S
4 
= M
d

mod N …S
t+1 
= M
d

mod N 
Then, S = 

+
=
1
1
t
i
i
 mod N i.e., 
S = [S
1
x S
2
x S
3
x S
4…
x S
t+1 
] mod N 


25 

S
= [(M
d

mod N) x (M
d

mod N) x (M
d

mod N) x (M
d

mod N) … x
(M
d
t
mod N) x (M
dc
mod N) ] mod N

S = (M
dc 
mod N) x
t
Π
i=1
S

mod N

S = S
c
x

+
=
1
1
t
i
i
 mod N 
Further, we see that 

S = M
d


d

+
d


d

+…+ 
d


d
c
mod N 

S = M
d
mod N 

S is the complete signed signature equivalent to the complete key d being used 
to sign the CSR. 
It can also be verified thus: 
S
e
mod N = M. 
If the signature was computed using the right shares, using the public exponent e on 
the final signature results in getting the original message back again. 
3.6 Key Generation by the Trusted Dealer. 
The Trusted Dealer is responsible for the generation and distribution of the secret 
components and the private-key shares to the concerned players in the system 
appropriately. 
He generates the modulus N, the public exponent e, the complete private exponent d. He 
then chops up the private exponent d into the required number of private shares for 
distribution. The secret components are generated in a technique similar to that used in 
the RSA algorithm, which was described earlier.


26 
In order to generate a modulus N, the Trusted Dealer starts by generating a very strong
large prime number p. The emphasis on strong and large has been highlighted earlier. On 
successful verification of its prime nature, it generates another prime number q of the 
same order of magnitude as p. By order of magnitude of the secret components, we mean 
the size of the numbers in bits. The two numbers p and q are known as the prime 
derivatives of N. The TD computes N = p · q, which is of the order of magnitude of p + 
q. He selects the public key e such that e is relatively prime when compared to p and q
He computes the complete private-key d
 
from e as per the RSA scheme. Once the private-
key is computed, he sets himself to the task of splitting up the key into the required 
number of secret key shares.

Download 217.42 Kb.

Do'stlaringiz bilan baham:
1   ...   16   17   18   19   20   21   22   23   ...   43




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling