Parallel key exchange
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jeong, Ik Rae | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-09T16:32:36Z | - |
dc.date.available | 2021-09-09T16:32:36Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2008 | - |
dc.identifier.issn | 0948-695X | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/125552 | - |
dc.description.abstract | In the paper we study parallel key exchange among multiple parties. The status of parallel key exchange can be depicted by a key graph. In a key graph, a vertex represents a party and an edge represents a relation of two parties who are to share a key. We first propose a security model for a key graph, which extends the Bellare-Rogaway model for two-party key exchange. Next, we clarify the relations among the various security notions of key exchange. Finally, we construct an efficient key exchange protocol for a key graph using the randomness re-use technique. Our protocol establishes the multiple keys corresponding to all edges of a key graph in a single session. The security of our protocol is proven in the standard model. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | GRAZ UNIV TECHNOLGOY, INST INFORMATION SYSTEMS COMPUTER MEDIA-IICM | - |
dc.subject | SECURE | - |
dc.subject | PROTOCOLS | - |
dc.subject | AGREEMENT | - |
dc.subject | SIGNATURE | - |
dc.title | Parallel key exchange | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Jeong, Ik Rae | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.scopusid | 2-s2.0-44349146190 | - |
dc.identifier.wosid | 000254398900004 | - |
dc.identifier.bibliographicCitation | JOURNAL OF UNIVERSAL COMPUTER SCIENCE, v.14, no.3, pp.377 - 396 | - |
dc.relation.isPartOf | JOURNAL OF UNIVERSAL COMPUTER SCIENCE | - |
dc.citation.title | JOURNAL OF UNIVERSAL COMPUTER SCIENCE | - |
dc.citation.volume | 14 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 377 | - |
dc.citation.endPage | 396 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | SECURE | - |
dc.subject.keywordPlus | PROTOCOLS | - |
dc.subject.keywordPlus | AGREEMENT | - |
dc.subject.keywordPlus | SIGNATURE | - |
dc.subject.keywordAuthor | key exchange | - |
dc.subject.keywordAuthor | key graph | - |
dc.subject.keywordAuthor | security notions | - |
dc.subject.keywordAuthor | randomness re-use | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.