Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lu, CF | en_US |
dc.contributor.author | Shieh, SP | en_US |
dc.date.accessioned | 2014-12-08T15:39:32Z | - |
dc.date.available | 2014-12-08T15:39:32Z | - |
dc.date.issued | 2004-03-01 | en_US |
dc.identifier.issn | 1016-2364 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/26993 | - |
dc.description.abstract | This paper addresses the security and efficiency of key-evolving protocols in public key encryption and signature schemes, where the security assumption is the intractability of the discrete logarithm problem. We identify the key-independence property as the security goal of key-evolving, so that each periodic secret key is independent of each other. The first protocol operates in Z(p)* and is efficient for the secret-key holders the second operates in Z(n)*, and is efficient for the public-key holder. For both protocols, we provide proofs and analysis for correctness, security and efficiency. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | provable security | en_US |
dc.subject | discrete logarithm | en_US |
dc.subject | key management | en_US |
dc.subject | key evolving | en_US |
dc.subject | key independence | en_US |
dc.title | Secure key-evolving for public key cryptosystems based on the discrete logarithm problem | en_US |
dc.type | Article; Proceedings Paper | en_US |
dc.identifier.journal | JOURNAL OF INFORMATION SCIENCE AND ENGINEERING | en_US |
dc.citation.volume | 20 | en_US |
dc.citation.issue | 2 | en_US |
dc.citation.spage | 391 | en_US |
dc.citation.epage | 400 | en_US |
dc.contributor.department | 資訊科學與工程研究所 | zh_TW |
dc.contributor.department | Institute of Computer Science and Engineering | en_US |
dc.identifier.wosnumber | WOS:000220309900010 | - |
Appears in Collections: | Conferences Paper |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.