Skip to main content

Secure Key-Evolving Protocols for Discrete Logarithm Schemes

  • Conference paper
  • First Online:
Topics in Cryptology — CT-RSA 2002 (CT-RSA 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2271))

Included in the following conference series:

Abstract

This paper addresses the security and efficiency of key-evolving protocols. We identify forward-secrecy and backward-secrecy as the security goals for key-evolving and present two protocols to achieve these goals. The first protocol is operated in Z p * and is efficient for the secret-key holder; the second one is operated in Z n *, and is efficient for the public-key holder. For both protocols, we provide proofs and analysis for correctness, security and efficiency.

This work is supported in part by Ministry of Education, National Science Council of Taiwan, and Lee & MTI Center, National Chiao Tung University.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abdalla and M. Bellare. Increasing the lifetime of a key: a comparative analysis of the security of re-keying techniques. In T. Okamoto, editor, Advances in Cryptology-ASIACRYPT’ 2000, Kyoto, Japan, 2000.

    Google Scholar 

  2. R.J. Anderson. Two remarks on public key cryptology. In Rump Session Eurocrypt’97.

    Google Scholar 

  3. E. Bach. Discrete logarithm and factoring. Report no. UCB/CSD 84/186, Comp. Sc. Division (EECS), University of California, Berkeley, June 1984.

    Google Scholar 

  4. M. Bellare and S. K. Miner. A forward-secure digital signature scheme. In Proc. 19th International Advances in Cryptology Conference-CRYPTO’ 99, pages 431–448, 1999.

    Google Scholar 

  5. D. E. Denning and M. S. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(7):533–536, 1981.

    Article  Google Scholar 

  6. P. Feldman. A practical scheme for non-interactive verifiable secret sharing. In 28th Symposium on Foundations of Computer Science (FOCS), pages 427–437. IEEE Computer Society Press, 1987.

    Google Scholar 

  7. C. G. Guenther. An identity-based key-exchange protocol. In Jean-Jacques Quisquater and Joos Vandewalle, editors, Advances in Cryptology-EuroCrypt’ 89, pages 29–37, Berlin, 1989. Springer-Verlag. Lecture Notes in Computer Science Volume 434.

    Google Scholar 

  8. Y. Kim, A. Perrig, and G. Tsudik. Simple and fault-tolerant key agreement for dynamic collaborative groups. In Proceedings of the 7th ACM conference on Computer and communications security (CCS-00), pages 235–244. ACM Press, 2000.

    Google Scholar 

  9. H. Krawczyk. Simple forward-secure signatures from any signature scheme. In Sushil Jajodia and Pierangela Samarati, editors, Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS-00), pages 108–115. ACM Press, 2000.

    Google Scholar 

  10. U. M. Maurer and Y. Yacobi. A non-interactive public-key distribution system. Designs, Codes and Cryptography, vol. 9, no. 3:305–316, 1996.

    MATH  MathSciNet  Google Scholar 

  11. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. Boca Raton, 1997.

    Google Scholar 

  12. A. Perrig. Efficient collaborative key management protocols for secure autonomous group communication. In International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC’ 99), July 1999.

    Google Scholar 

  13. A. Shamir. How to share a secret. Communication of ACM, pages 612–613, (Nov. 1979).

    Google Scholar 

  14. M. Steiner, G. Tsudik, and M. Waidner. Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems, 11(8):769–780, August 2000.

    Article  Google Scholar 

  15. W. Tzeng and Z. Tzeng. Robust key-evolving public key encryption schemes. Record 2001/009, Cryptology ePrint Archive, 2001.

    Google Scholar 

  16. Y. Yacobi. A key distribution s “paradox”. In Alfred J. Menezes and Scott A. Vanstone, editors, Advances in Cryptology-Crypto’ 90, pages 268–273, Berlin, 1990. Springer-Verlag. Lecture Notes in Computer Science Volume 537.

    Google Scholar 

  17. Y. Yacobi and Z. Shmuely. On key distribution systems. In Gilles Brassard, editor, Advances in Cryptology-Crypto’ 89, pages 344–355, Berlin, 1989. Springer-Verlag. Lecture Notes in Computer Science Volume 435.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cheng-Fen, L., Shieh, S.W. (2002). Secure Key-Evolving Protocols for Discrete Logarithm Schemes. In: Preneel, B. (eds) Topics in Cryptology — CT-RSA 2002. CT-RSA 2002. Lecture Notes in Computer Science, vol 2271. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45760-7_21

Download citation

  • DOI: https://doi.org/10.1007/3-540-45760-7_21

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43224-1

  • Online ISBN: 978-3-540-45760-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics