On the computational security of a distributed key distribution scheme
Mostra el registre complet Registre parcial de l'ítem
- dc.contributor.author Daza, Vanesaca
- dc.contributor.author Herranz, Javierca
- dc.contributor.author Sáez, Germánca
- dc.date.accessioned 2013-02-27T15:44:56Z
- dc.date.available 2013-02-27T15:44:56Z
- dc.date.issued 2008ca
- dc.description.abstract In a distributed key distribution scheme, a set of servers helps a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some servers and some users has no information about the key of a noncorrupted group. In this work, we formalize the security analysis of one such scheme which was not considered in the original proposal. We prove the scheme is secure in the random oracle model, assuming that the Decisional Diffie-Hellman (DDH) problem is hard to solve. We also detail a possible modification of that scheme and the one in which allows us to prove the security of the schemes without assuming that a specific hash function behaves as a random oracle. As usual, this improvement in the security of the schemes is at the cost of an efficiency loss.
- dc.description.sponsorship The work of the first two authors was partially supported by the Spanish Ministry of Education and Science under Projects TSI2007-65406-C03-02 (“eAEGIS”) and CONSOLIDER CSD2007-00004 (“ARES”). The work of V. Daza was also supported by the Government of Catalonia under Grant 2005-SGR-00446. The work of J. Herranz was also supported by the Government of Catalonia under Grant 2005-SGR-00093. Finally, the work of G. Sáez was partially supported by the/nSpanish Ministry of Education and Science under Project TSI2006-02731.
- dc.format.mimetype application/pdfca
- dc.identifier.citation Daza V, Herranz J, Sáez G. On the computational security of a distributed key distribution scheme. IEEE Trans. Comput. 2008; 57(8): 1087-1097. DOI 10.1109/TC.2008.50ca
- dc.identifier.doi http://dx.doi.org/10.1109/TC.2008.50
- dc.identifier.issn 0018-9340ca
- dc.identifier.uri http://hdl.handle.net/10230/20428
- dc.language.iso engca
- dc.publisher Institute of Electrical and Electronics Engineers (IEEE)ca
- dc.relation.ispartof IEEE Transactions on Computers. 2008; 57(8)
- dc.relation.projectID info:eu-repo/grantAgreement/ES/2PN/CSD2007-00004
- dc.rights © 2008 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works./nThe final published article can be found at http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4479446ca
- dc.rights.accessRights info:eu-repo/semantics/openAccessca
- dc.subject.keyword Cryptography
- dc.subject.keyword Key distribution
- dc.subject.keyword Secret sharing schemes
- dc.subject.keyword Provable security
- dc.subject.other Criptografia
- dc.title On the computational security of a distributed key distribution schemeca
- dc.type info:eu-repo/semantics/articleca
- dc.type.version info:eu-repo/semantics/publishedVersionca