Threshold cryptosystems from threshold fully homomorphic encryption

Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim*, Peter M.R. Rasmussen, Amit Sahai

*Corresponding author for this work
34 Citations (Scopus)

Abstract

We develop a general approach to adding a threshold functionality to a large class of (non-threshold) cryptographic schemes. A threshold functionality enables a secret key to be split into a number of shares, so that only a threshold of parties can use the key, without reconstructing the key. We begin by constructing a threshold fully-homomorphic encryption scheme (ThFHE) from the learning with errors (LWE) problem. We next introduce a new concept, called a universal thresholdizer, from which many threshold systems are possible. We show how to construct a universal thresholdizer from our ThFHE. A universal thresholdizer can be used to add threshold functionality to many systems, such as CCA-secure public-key encryption (PKE), signature schemes, pseudorandom functions, and others primitives. In particular, by applying this paradigm to a (non-threshold) lattice signature system, we obtain the first single-round threshold signature scheme from LWE.

Original languageEnglish
Title of host publicationAdvances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings
EditorsAlexandra Boldyreva, Hovav Shacham
Number of pages32
PublisherSpringer
Publication date2018
Pages565-596
ISBN (Print)9783319968834
DOIs
Publication statusPublished - 2018
Externally publishedYes
Event38th Annual International Cryptology Conference, CRYPTO 2018 - Santa Barbara, United States
Duration: 19 Aug 201823 Aug 2018

Conference

Conference38th Annual International Cryptology Conference, CRYPTO 2018
Country/TerritoryUnited States
CitySanta Barbara
Period19/08/201823/08/2018
SeriesLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10991 LNCS
ISSN0302-9743

Fingerprint

Dive into the research topics of 'Threshold cryptosystems from threshold fully homomorphic encryption'. Together they form a unique fingerprint.

Cite this