In a distributed key distribution scheme, a set of servers help a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some servers and some users has no information about the key of a non-corrupted group. In this work we formalize the security analysis of one of such schemes [11] which was not considered in the original proposal. We prove the scheme secure in the random oracle model, assuming that the Decisional Diffie-Hellman (DDH) problem is hard to solve. We also detail a possible modification of that scheme and the one in [24] which allows to prove the security of the schemes without assuming that a specific hash function behaves as a random oracle. As usual, this improvement in the sec...
Abstract. The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cr...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
In this work we study distributed public key schemes secure against continual memory leakage. The se...
In a distributed key distribution scheme, a set of servers helps a set of users in a group to secure...
Abstract—In a distributed key distribution scheme, a set of servers helps a set of users in a group ...
Abstract — In a distributed key distribution scheme, a set of servers help a set of users in a group...
In [16], Naor, Pinkas and Reingold introduced schemes in which some groups of servers distribute key...
Key distribution schemes play a significant role in key assignment schemes which allow participants ...
A Key Distribution Center of a network is a server who generates anddistributes secret keys to group...
In this paper we investigate the issues concerning with the use of a single server across a network,...
A cryptographic scheme is \provably secure " if an attack onthescheme implies an attack on ...
Distributed key generation is a main component of threshold cryptosystems and distributed cryptograp...
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key a...
[[abstract]]The Diffie-Hellman (DH) problem is an important security assumption in modern cryptograp...
We take a critical look at the relationship between the security of cryptographic schemes in the Ran...
Abstract. The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cr...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
In this work we study distributed public key schemes secure against continual memory leakage. The se...
In a distributed key distribution scheme, a set of servers helps a set of users in a group to secure...
Abstract—In a distributed key distribution scheme, a set of servers helps a set of users in a group ...
Abstract — In a distributed key distribution scheme, a set of servers help a set of users in a group...
In [16], Naor, Pinkas and Reingold introduced schemes in which some groups of servers distribute key...
Key distribution schemes play a significant role in key assignment schemes which allow participants ...
A Key Distribution Center of a network is a server who generates anddistributes secret keys to group...
In this paper we investigate the issues concerning with the use of a single server across a network,...
A cryptographic scheme is \provably secure " if an attack onthescheme implies an attack on ...
Distributed key generation is a main component of threshold cryptosystems and distributed cryptograp...
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key a...
[[abstract]]The Diffie-Hellman (DH) problem is an important security assumption in modern cryptograp...
We take a critical look at the relationship between the security of cryptographic schemes in the Ran...
Abstract. The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cr...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
In this work we study distributed public key schemes secure against continual memory leakage. The se...