Secure key-evolving for public key cryptosystems based on the discrete logarithm problem

被引:1
|
作者
Lu, CF [1 ]
Shieh, SP
机构
[1] Ta Hwa Inst Technol, Dept Comp Sci & Informat Engn, Hsinchu 307, Taiwan
[2] Natl Chiao Tung Univ, Comp Sci & Informat Engn Dept, Hsinchu 300, Taiwan
关键词
provable security; discrete logarithm; key management; key evolving; key independence;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses the security and efficiency of key-evolving protocols in public key encryption and signature schemes, where the security assumption is the intractability of the discrete logarithm problem. We identify the key-independence property as the security goal of key-evolving, so that each periodic secret key is independent of each other. The first protocol operates in Z(p)* and is efficient for the secret-key holders the second operates in Z(n)*, and is efficient for the public-key holder. For both protocols, we provide proofs and analysis for correctness, security and efficiency.
引用
收藏
页码:391 / 400
页数:10
相关论文
共 50 条
  • [21] PUBLIC KEY CRYPTOSYSTEMS
    ELKATEEB, A
    ALKHAYATT, S
    INFORMATION AGE, 1983, 5 (04): : 232 - 237
  • [22] Anonymous conference key distribution systems based on the discrete logarithm problem
    Tseng, YM
    Jan, JK
    COMPUTER COMMUNICATIONS, 1999, 22 (08) : 749 - 754
  • [23] Extended multivariate public key cryptosystems with secure encryption function
    WANG HouZhen 1
    2 State Key Laboratory of Software Engineering
    ScienceChina(InformationSciences), 2011, 54 (06) : 1161 - 1171
  • [24] Extended multivariate public key cryptosystems with secure encryption function
    HouZhen Wang
    HuanGuo Zhang
    ZhangYi Wang
    Ming Tang
    Science China Information Sciences, 2011, 54
  • [25] Public key cryptosystems secure against memory leakage attacks
    Sun, Shi-Feng
    Han, Shuai
    Gu, Dawu
    Liu, Shengli
    IET INFORMATION SECURITY, 2016, 10 (06) : 403 - 412
  • [26] Extended multivariate public key cryptosystems with secure encryption function
    Wang HouZhen
    Zhang HuanGuo
    Wang ZhangYi
    Tang Ming
    SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (06) : 1161 - 1171
  • [27] Cryptanalysis of the cryptosystems based on the generalized hidden discrete logarithm problem
    Ma, Yanlong
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2024, 32 (02) : 289 - 307
  • [28] Efficient key-evolving protocol for the GQ signature
    Lu, CF
    Shieh, S
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2004, 20 (04) : 763 - 769
  • [29] Key-insulated public key cryptosystems
    Dodis, Y
    Katz, J
    Xu, SH
    Yung, MT
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 65 - 82
  • [30] A study of public key cryptosystems based on quasigroups
    Kumar, Satish
    Gupta, Indivar
    Gupta, Ashok Ji
    CRYPTOLOGIA, 2023, 47 (06) : 511 - 540