Mostra el registre d'ítem simple
On the computational security of a distributed key distribution scheme
dc.contributor.author | Daza, Vanesa |
dc.contributor.author | Herranz Sotoca, Javier |
dc.contributor.author | Sáez Moreno, Germán |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament de Matemàtica Aplicada IV |
dc.date.accessioned | 2008-07-22T09:45:36Z |
dc.date.available | 2008-07-22T09:45:36Z |
dc.date.created | 2005-08 |
dc.date.issued | 2008-08 |
dc.identifier.citation | Daza,V.; Herranz, J.; Sáez, G. On the computational securituy of a distributed key distribution scheme. IEEE transactions on computers, 2008, vol. 57, núm. 8, p. 1087-1097. |
dc.identifier.issn | 0018-9340 |
dc.identifier.uri | http://hdl.handle.net/2117/2170 |
dc.description.abstract | In a distributed key distribution scheme, a set of servers helps a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some servers and some users has no information about the key of a noncorrupted group. In this work, we formalize the security analysis of one such scheme [ 11] which was not considered in the original proposal. We prove the scheme is secure in the random oracle model, assuming that the Decisional Diffie-Hellman (DDH) problem is hard to solve. We also detail a possible modification of that scheme and the one in [ 24] which allows us to prove the security of the schemes without assuming that a specific hash function behaves as a random oracle. As usual, this improvement in the security of the schemes is at the cost of an efficiency loss. |
dc.format.extent | 11 p. |
dc.language.iso | eng |
dc.publisher | IEEE |
dc.subject.lcsh | Information and Communication Applications, Inc. |
dc.subject.other | Cryptography |
dc.subject.other | Key distribution |
dc.subject.other | Secret sharing schemes |
dc.subject.other | Provable security |
dc.title | On the computational security of a distributed key distribution scheme |
dc.type | Article |
dc.subject.lemac | Comunicació |
dc.subject.lemac | Informació |
dc.contributor.group | Universitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia |
dc.description.peerreviewed | Peer Reviewed |
dc.subject.ams | Classificació AMS::94 Information And Communication, Circuits::94A Communication, information |
dc.rights.access | Open Access |
local.personalitzacitacio | true |
Fitxers d'aquest items
Aquest ítem apareix a les col·leccions següents
-
Articles de revista [48]
-
Articles de revista [3.268]