Security Analysis of a Distributed Common Secret Generation Procedure

Loading...
Thumbnail Image

Files

TR_99-34.pdf (207.93 KB)
No. of downloads: 322

Publication or External Link

Date

1999

Citation

DRUM DOI

Abstract

In a distributed scheme allowing any number of members to compute a commonsecret without revealing individual secret was proposed. We present asecurity weakness of this protocol. In doing so, we show that any twomembers can collude and obtain the secret contributed by middle memberin generating the common secret.

Journal of Cryptology

Notes

Rights