메뉴 건너뛰기




Volumn 4622 LNCS, Issue , 2007, Pages 482-499

A generalization of DDH with applications to protocol analysis and computational soundness

Author keywords

Computational soundness; Diffie Hellman assumptions; Protocol security; Provable security

Indexed keywords

COMPUTATIONAL COMPLEXITY; NETWORK SECURITY; PROBLEM SOLVING;

EID: 38049082991     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74143-5_27     Document Type: Conference Paper
Times cited : (34)

References (23)
  • 2
    • 0142156713 scopus 로고    scopus 로고
    • Variations of Diffie-Hellman problem
    • Qing, S, Gollmann, D, Zhou, J, eds, ICICS 2003, Springer, Heidelberg
    • Bao, F., Deng, R., Zhu, H.: Variations of Diffie-Hellman problem. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 301-312. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2836 , pp. 301-312
    • Bao, F.1    Deng, R.2    Zhu, H.3
  • 3
    • 84948957152 scopus 로고    scopus 로고
    • Public-key encryption in a multi-user setting: Security proofs and improvements
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: Security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259-274. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 4
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. of Computing 13, 850-864 (1984)
    • (1984) SIAM J. of Computing , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 5
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 6
    • 84958755223 scopus 로고    scopus 로고
    • Group Diffie-Hellman key exchange secure against dictionary attacks
    • Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
    • Bresson, E., Chevassut, O., Pointcheval, D.: Group Diffie-Hellman key exchange secure against dictionary attacks. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 497-514. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2501 , pp. 497-514
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 7
    • 35248849912 scopus 로고    scopus 로고
    • Bresson, E., Chevassut, O., Pointcheval, D.: The group Diffie-Hellman problems. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, 2595, pp. 325-338. Springer, Heidelberg (2003)
    • Bresson, E., Chevassut, O., Pointcheval, D.: The group Diffie-Hellman problems. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 325-338. Springer, Heidelberg (2003)
  • 8
    • 84948991087 scopus 로고    scopus 로고
    • Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system (extended abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, 950, pp. 275-286. Springer, Heidelberg (1995)
    • Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system (extended abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275-286. Springer, Heidelberg (1995)
  • 9
    • 84958626314 scopus 로고    scopus 로고
    • Towards realizing random oracles: Hash functions that hide all partial information
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Canetti, R.: Towards realizing random oracles: Hash functions that hide all partial information. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 455-469. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 455-469
    • Canetti, R.1
  • 10
    • 0001638393 scopus 로고    scopus 로고
    • On polynomial approximation of the discrete logarithm and the Diffie-Hellman mapping
    • Coppersmith, D., Shparlinski, I..: On polynomial approximation of the discrete logarithm and the Diffie-Hellman mapping. J. of Cryptology 13(2), 339-360 (2000)
    • (2000) J. of Cryptology , vol.13 , Issue.2 , pp. 339-360
    • Coppersmith, D.1    Shparlinski, I.2
  • 11
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 12
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev, D., Yao, A.: On the security of public key protocols. IEEE IT 29(12), 198-208 (1983)
    • (1983) IEEE IT , vol.29 , Issue.12 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 13
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithm
    • ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE IT 31(4), 469-472 (1985)
    • (1985) IEEE IT , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 14
    • 35248878854 scopus 로고    scopus 로고
    • Scalable protocols for authenticated group key exchange
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110-125. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 110-125
    • Katz, J.1    Yung, M.2
  • 15
    • 84974681711 scopus 로고    scopus 로고
    • A tool box of cryptographic functions related to the Diffie-Hellman function
    • Kiltz, E.: A tool box of cryptographic functions related to the Diffie-Hellman function. In: Indocrypt '01, pp. 339-350 (2001)
    • (2001) Indocrypt '01 , pp. 339-350
    • Kiltz, E.1
  • 16
    • 84955567079 scopus 로고    scopus 로고
    • Diffie-Hellman oracles
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Maurer, U., Wolf, S.: Diffie-Hellman oracles. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 268-282. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 268-282
    • Maurer, U.1    Wolf, S.2
  • 17
    • 38049154435 scopus 로고    scopus 로고
    • Micciancio, D., Panjwani, S.: Adaptive security of symbolic encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 245-263. Springer, Heidelberg (2005)
    • Micciancio, D., Panjwani, S.: Adaptive security of symbolic encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 245-263. Springer, Heidelberg (2005)
  • 18
    • 0344875571 scopus 로고    scopus 로고
    • Micciancio, D., Warinschi, B.: Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. J. of Computer Security. Preliminary version in WITS 2002 (2004)
    • Micciancio, D., Warinschi, B.: Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. J. of Computer Security. Preliminary version in WITS 2002 (2004)
  • 19
    • 0031332843 scopus 로고    scopus 로고
    • Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: FOCS '97, pp. 458-467 (1997)
    • Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: FOCS '97, pp. 458-467 (1997)
  • 20
    • 84945137819 scopus 로고    scopus 로고
    • Assumptions related to discrete logarithms: Why subtleties make a real difference
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Sadeghi, A.-R., Steiner, M.: Assumptions related to discrete logarithms: Why subtleties make a real difference. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 244-261. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 244-261
    • Sadeghi, A.-R.1    Steiner, M.2
  • 21
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
    • Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256-266. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 256-266
    • Shoup, V.1
  • 22
    • 0037205807 scopus 로고    scopus 로고
    • x2. IPL 83(2), 109-113 (2002)
    • x2. IPL 83(2), 109-113 (2002)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.