Secure key-evolving for public key cryptosystems based on the discrete logarithm problem

被引:1
|
作者
Lu, CF [1 ]
Shieh, SP
机构
[1] Ta Hwa Inst Technol, Dept Comp Sci & Informat Engn, Hsinchu 307, Taiwan
[2] Natl Chiao Tung Univ, Comp Sci & Informat Engn Dept, Hsinchu 300, Taiwan
关键词
provable security; discrete logarithm; key management; key evolving; key independence;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses the security and efficiency of key-evolving protocols in public key encryption and signature schemes, where the security assumption is the intractability of the discrete logarithm problem. We identify the key-independence property as the security goal of key-evolving, so that each periodic secret key is independent of each other. The first protocol operates in Z(p)* and is efficient for the secret-key holders the second operates in Z(n)*, and is efficient for the public-key holder. For both protocols, we provide proofs and analysis for correctness, security and efficiency.
引用
收藏
页码:391 / 400
页数:10
相关论文
共 50 条
  • [31] Group ring based public key cryptosystems
    Mittal, Gaurav
    Kumar, Sunil
    Narain, Shiv
    Kumar, Sandeep
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (06): : 1683 - 1704
  • [32] FPGA based unified architecture for public key and private key cryptosystems
    Wang, Yi
    Li, Renfa
    FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (03) : 307 - 316
  • [33] A knapsack public-key cryptosystem based on elliptic curve discrete logarithm
    Su, PC
    Lu, EH
    Chang, HKC
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 40 - 46
  • [34] Key exposure free chameleon hash schemes based on discrete logarithm problem
    Lim, Seongan
    Lee, Juhee
    An, Youngjoo
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (07) : 812 - 817
  • [35] FPGA based unified architecture for public key and private key cryptosystems
    Yi Wang
    Renfa Li
    Frontiers of Computer Science, 2013, 7 : 307 - 316
  • [36] A conference key distribution system for the star configuration based on the discrete logarithm problem
    Hirose, S
    Ikeda, K
    INFORMATION PROCESSING LETTERS, 1997, 62 (04) : 189 - 192
  • [37] Quaternion Public Key Cryptosystems
    Valluri, Maheswara Rao
    Narayan, Shailendra Vikash
    2016 WORLD CONGRESS ON INDUSTRIAL CONTROL SYSTEMS SECURITY (WCICSS), 2016, : 48 - 51
  • [38] Indifferentiability for Public Key Cryptosystems
    Zhandry, Mark
    Zhang, Cong
    ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 : 63 - 93
  • [39] Multivariable public key cryptosystems
    Ding, Jintai
    Schmidt, Dieter
    Algebra and its Applications, 2006, 419 : 79 - 94
  • [40] How to implement cost-effective and secure public key cryptosystems
    Lee, PJ
    Lee, EJ
    Kim, YD
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, 1999, 1717 : 73 - 79