完整後設資料紀錄
DC 欄位語言
dc.contributor.authorLu, CFen_US
dc.contributor.authorShieh, SPen_US
dc.date.accessioned2014-12-08T15:39:32Z-
dc.date.available2014-12-08T15:39:32Z-
dc.date.issued2004-03-01en_US
dc.identifier.issn1016-2364en_US
dc.identifier.urihttp://hdl.handle.net/11536/26993-
dc.description.abstractThis paper addresses the security and efficiency of key-evolving protocols in public key encryption and signature schemes, where the security assumption is the intractability of the discrete logarithm problem. We identify the key-independence property as the security goal of key-evolving, so that each periodic secret key is independent of each other. The first protocol operates in Z(p)* and is efficient for the secret-key holders the second operates in Z(n)*, and is efficient for the public-key holder. For both protocols, we provide proofs and analysis for correctness, security and efficiency.en_US
dc.language.isoen_USen_US
dc.subjectprovable securityen_US
dc.subjectdiscrete logarithmen_US
dc.subjectkey managementen_US
dc.subjectkey evolvingen_US
dc.subjectkey independenceen_US
dc.titleSecure key-evolving for public key cryptosystems based on the discrete logarithm problemen_US
dc.typeArticle; Proceedings Paperen_US
dc.identifier.journalJOURNAL OF INFORMATION SCIENCE AND ENGINEERINGen_US
dc.citation.volume20en_US
dc.citation.issue2en_US
dc.citation.spage391en_US
dc.citation.epage400en_US
dc.contributor.department資訊科學與工程研究所zh_TW
dc.contributor.departmentInstitute of Computer Science and Engineeringen_US
dc.identifier.wosnumberWOS:000220309900010-
顯示於類別:會議論文


文件中的檔案:

  1. 000220309900010.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。