On the computational security of a distributed key distribution scheme
![Thumbnail](/bitstream/id/8f9ba5e9-2dba-4192-ab1e-2e0e3513dcae/04479446.pdf.jpg?sequence=4&isAllowed=y)
View/Open
Cita com:
hdl:2117/2170
Document typeArticle
Defense date2008-08
PublisherIEEE
Rights accessOpen Access
All rights reserved. This work is protected by the corresponding intellectual and industrial
property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public
communication or transformation of this work are prohibited without permission of the copyright holder
Abstract
In a distributed key distribution scheme, a set of servers helps a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some servers and some users has no information about the key of a noncorrupted group. In this work, we formalize the security analysis of one such scheme [ 11] which was not considered in the original proposal. We prove the scheme is secure in the random oracle model, assuming that the Decisional Diffie-Hellman (DDH) problem is hard to solve. We also detail a possible modification of that scheme and the one in [ 24] which allows us to prove the security of the schemes without assuming that a specific hash function behaves as a random oracle. As usual, this improvement in the security of the schemes is at the cost of an efficiency loss.
CitationDaza,V.; Herranz, J.; Sáez, G. On the computational securituy of a distributed key distribution scheme. IEEE transactions on computers, 2008, vol. 57, núm. 8, p. 1087-1097.
ISSN0018-9340
Files | Description | Size | Format | View |
---|---|---|---|---|
04479446.pdf | 217,9Kb | View/Open |