A Distributed and Computationally Secure Key Distribution Scheme

  • Authors:
  • Vanesa Daza;Javier Herranz;Carles Padró;Germán Sáez

  • Affiliations:
  • -;-;-;-

  • Venue:
  • ISC '02 Proceedings of the 5th International Conference on Information Security
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

In [16], Naor, Pinkas and Reingold introduced schemes in which some groups of servers distribute keys among a set of users in a distributed way. They gave some specific proposals both in the unconditional and in the computational security framework. Their computationally secure scheme is based on the Decisional Diffie-Hellman Assumption. This model assumes secure and authenticated communication between users and servers. Furthermore it requires users to do some expensive computations in order to obtain a key.In this paper we modify the model introduced in [16]. Our model makes the user's computations easier, because most computations of the protocol are carried out by servers, keeping to a more realistic situation. Furthermore, this new model requires only authenticated channels between users and servers.We propose a basic scheme, that makes use of ElGamal cryptosystem, and that fits in with this model in the case of a passive adversary. Then we add zero-knowledge proofs and verifiable secret sharing to prevent from the action of an active adversary. We consider general structures (not only the threshold ones) for those subsets of servers that can provide a key to a user and for those tolerated subsets of servers that can be corrupted by the adversary. We find necessary combinatorial conditions on these structures in order to provide security to our scheme.