Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Parallel key exchange

Full metadata record
DC Field Value Language
dc.contributor.authorJeong, Ik Rae-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-09T16:32:36Z-
dc.date.available2021-09-09T16:32:36Z-
dc.date.created2021-06-15-
dc.date.issued2008-
dc.identifier.issn0948-695X-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/125552-
dc.description.abstractIn the paper we study parallel key exchange among multiple parties. The status of parallel key exchange can be depicted by a key graph. In a key graph, a vertex represents a party and an edge represents a relation of two parties who are to share a key. We first propose a security model for a key graph, which extends the Bellare-Rogaway model for two-party key exchange. Next, we clarify the relations among the various security notions of key exchange. Finally, we construct an efficient key exchange protocol for a key graph using the randomness re-use technique. Our protocol establishes the multiple keys corresponding to all edges of a key graph in a single session. The security of our protocol is proven in the standard model.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherGRAZ UNIV TECHNOLGOY, INST INFORMATION SYSTEMS COMPUTER MEDIA-IICM-
dc.subjectSECURE-
dc.subjectPROTOCOLS-
dc.subjectAGREEMENT-
dc.subjectSIGNATURE-
dc.titleParallel key exchange-
dc.typeArticle-
dc.contributor.affiliatedAuthorJeong, Ik Rae-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.scopusid2-s2.0-44349146190-
dc.identifier.wosid000254398900004-
dc.identifier.bibliographicCitationJOURNAL OF UNIVERSAL COMPUTER SCIENCE, v.14, no.3, pp.377 - 396-
dc.relation.isPartOfJOURNAL OF UNIVERSAL COMPUTER SCIENCE-
dc.citation.titleJOURNAL OF UNIVERSAL COMPUTER SCIENCE-
dc.citation.volume14-
dc.citation.number3-
dc.citation.startPage377-
dc.citation.endPage396-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusSECURE-
dc.subject.keywordPlusPROTOCOLS-
dc.subject.keywordPlusAGREEMENT-
dc.subject.keywordPlusSIGNATURE-
dc.subject.keywordAuthorkey exchange-
dc.subject.keywordAuthorkey graph-
dc.subject.keywordAuthorsecurity notions-
dc.subject.keywordAuthorrandomness re-use-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Ik Rae photo

Jeong, Ik Rae
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE