Full metadata record
DC FieldValueLanguage
dc.contributor.authorLu, CFen_US
dc.contributor.authorShieh, SPen_US
dc.date.accessioned2014-12-08T15:39:32Z-
dc.date.available2014-12-08T15:39:32Z-
dc.date.issued2004-03-01en_US
dc.identifier.issn1016-2364en_US
dc.identifier.urihttp://hdl.handle.net/11536/26993-
dc.description.abstractThis paper addresses the security and efficiency of key-evolving protocols in public key encryption and signature schemes, where the security assumption is the intractability of the discrete logarithm problem. We identify the key-independence property as the security goal of key-evolving, so that each periodic secret key is independent of each other. The first protocol operates in Z(p)* and is efficient for the secret-key holders the second operates in Z(n)*, and is efficient for the public-key holder. For both protocols, we provide proofs and analysis for correctness, security and efficiency.en_US
dc.language.isoen_USen_US
dc.subjectprovable securityen_US
dc.subjectdiscrete logarithmen_US
dc.subjectkey managementen_US
dc.subjectkey evolvingen_US
dc.subjectkey independenceen_US
dc.titleSecure key-evolving for public key cryptosystems based on the discrete logarithm problemen_US
dc.typeArticle; Proceedings Paperen_US
dc.identifier.journalJOURNAL OF INFORMATION SCIENCE AND ENGINEERINGen_US
dc.citation.volume20en_US
dc.citation.issue2en_US
dc.citation.spage391en_US
dc.citation.epage400en_US
dc.contributor.department資訊科學與工程研究所zh_TW
dc.contributor.departmentInstitute of Computer Science and Engineeringen_US
dc.identifier.wosnumberWOS:000220309900010-
Appears in Collections:Conferences Paper


Files in This Item:

  1. 000220309900010.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.