Security Analysis of a Distributed Common Secret Generation Procedure
dc.contributor.advisor | Baras, John S. | en_US |
dc.contributor.author | R. Poovendran | en_US |
dc.contributor.author | Baras, John S. | en_US |
dc.contributor.department | ISR | en_US |
dc.contributor.department | CSHCN | en_US |
dc.date.accessioned | 2007-05-23T10:08:11Z | |
dc.date.available | 2007-05-23T10:08:11Z | |
dc.date.issued | 1999 | en_US |
dc.description.abstract | In a distributed scheme allowing any number of members to compute a commonsecret without revealing individual secret was proposed. We present asecurity weakness of this protocol. In doing so, we show that any twomembers can collude and obtain the secret contributed by middle memberin generating the common secret.<p><i>Journal of Cryptology</i> | en_US |
dc.format.extent | 212918 bytes | |
dc.format.mimetype | application/pdf | |
dc.identifier.uri | http://hdl.handle.net/1903/6073 | |
dc.language.iso | en_US | en_US |
dc.relation.ispartofseries | ISR; TR 1999-34 | en_US |
dc.relation.ispartofseries | CSHCN; TR 1999-16 | en_US |
dc.subject | user collusion | en_US |
dc.subject | Global Communication Systems | en_US |
dc.title | Security Analysis of a Distributed Common Secret Generation Procedure | en_US |
dc.type | Technical Report | en_US |
Files
Original bundle
1 - 1 of 1