A distributed and computationally secure key distribution scheme

6Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In [16], Naor, Pinkas and Reingold introduced schemes in which some groups of servers distribute keys among a set of users in a distributed way. They gave some specific proposals both in the unconditional and in the computational security framework. Their computationally secure scheme is based on the Decisional Diffie-Hellman Assumption. This model assumes secure and authenticated communication between users and servers. Furthermore it requires users to do some expensive computations in order to obtain a key. In this paper we modify the model introduced in [16]. Our model makes the user’s computations easier, because most computations of the protocol are carried out by servers, keeping to a more realistic situation. Furthermore, this new model requires only authenticated channels between users and servers. We propose a basic scheme, that makes use of ElGamal cryptosystem, and that fits in with this model in the case of a passive adversary. Then we add zero-knowledge proofs and verifiable secret sharing to prevent from the action of an active adversary. We consider general structures (not only the threshold ones) for those subsets of servers that can provide a key to a user and for those tolerated subsets of servers that can be corrupted by the adversary. We find necessary combinatorial conditions on these structures in order to provide security to our scheme.

Cite

CITATION STYLE

APA

Daza, V., Herranz, J., Padró, C., & Sáez, G. (2002). A distributed and computationally secure key distribution scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2433, pp. 342–356). Springer Verlag. https://doi.org/10.1007/3-540-45811-5_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free