Secure key-evolving for public key cryptosystems based on the discrete logarithm problem

被引:1
|
作者
Lu, CF [1 ]
Shieh, SP
机构
[1] Ta Hwa Inst Technol, Dept Comp Sci & Informat Engn, Hsinchu 307, Taiwan
[2] Natl Chiao Tung Univ, Comp Sci & Informat Engn Dept, Hsinchu 300, Taiwan
关键词
provable security; discrete logarithm; key management; key evolving; key independence;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses the security and efficiency of key-evolving protocols in public key encryption and signature schemes, where the security assumption is the intractability of the discrete logarithm problem. We identify the key-independence property as the security goal of key-evolving, so that each periodic secret key is independent of each other. The first protocol operates in Z(p)* and is efficient for the secret-key holders the second operates in Z(n)*, and is efficient for the public-key holder. For both protocols, we provide proofs and analysis for correctness, security and efficiency.
引用
收藏
页码:391 / 400
页数:10
相关论文
共 50 条
  • [1] New Public Key Cryptosystems Based on Difficulty of Factorization and Discrete Logarithm Problems
    Moldovyan, N. A.
    INFORMATION FUSION AND GEOGRAPHIC INFORMATION SYSTEMS, PROCEEDINGS, 2007, : 160 - 172
  • [2] Robust key-evolving public key encryption schemes
    Tzeng, WG
    Tzeng, ZJ
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 61 - 72
  • [3] Extended Fault Based Attack against Discrete Logarithm Based Public Key Cryptosystems
    Yen, Sung-Ming
    Wu, Chi-Dian
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS AND TECHNOLOGIES (SECURWARE 2011), 2011, : 25 - 30
  • [4] An alternative practical public-key cryptosystems based on the Dependent RSA Discrete Logarithm Problems
    Tripathi, Shailendra Kumar
    Gupta, Bhupendra
    Pandian, K. K. Soundra
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 164
  • [5] FORSAKES: A FORWARD-SECURE AUTHENTICATED KEY EXCHANGE PROTOCOL BASED ON SYMMETRIC KEY-EVOLVING SCHEMES
    Dousti, Mohammad Sadeq
    Jalili, Rasool
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2015, 9 (04) : 471 - 514
  • [6] An ID-Based Public key Cryptosystem based on the Double Discrete Logarithm Problem
    Meshram, Chandrashekhar
    Agrawal, Shyam Sundar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (07): : 8 - 13
  • [7] Efficient and secure public-key cryptosystems
    Takagi, T
    CONTEMPORARY CRYPTOLOGY, 2005, : 191 - 237
  • [8] Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
    Rosario Gennaro
    Stanislaw Jarecki
    Hugo Krawczyk
    Tal Rabin
    Journal of Cryptology, 2007, 20 : 51 - 83
  • [9] Secure distributed key generation for discrete-log based cryptosystems
    Gennaro, Rosario
    Jarecki, Stanislaw
    Krawczyk, Hugo
    Rabin, Tal
    JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 51 - 83
  • [10] Secure distributed key generation for discrete-log based cryptosystems
    Gennaro, R
    Jarecki, S
    Krawczyk, H
    Rabin, T
    ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 295 - 310