Sender Authenticated Key Agreements without Random Oracles
スポンサーリンク
概要
- 論文の詳細を見る
The purpose of this paper is to study sender authenticated key agreements by a third party, which uses the received parameters to verify the fact that a sender of a message knows his long-term private key. In particular, we propose a standard model for the protocol among three entities for the first time. The security of this protocol depends on the difficulty of solving two new problems related to one-way isomorphisms and the decision co-bilinear Diffie-Hellman problem on multiplicative cyclic groups. It is the first time that the security of a key agreement has been formally proven by using negligible probability. We believe that our contribution gives many applications in the cryptographic community.
- (社)電子情報通信学会の論文
- 2009-08-01
著者
-
OKAMOTO Takeshi
Department of Neurosurgery, Japanese Red Cross Nagoya Daiichi Hospital
-
Okamoto Eiji
Graduate School Of Systems And Information Engineering University Of Tsukuba
-
SATO Chifumi
SBI Net Systems Co., Ltd.
-
Sato Chifumi
Sbi Net Systems Co. Ltd.
-
Okamoto Takeshi
Department Of Materials Science And Engineering Graduate School Of Engineering Nagoya University
-
Okamoto Takeshi
Department Of Computer Science Faculty Of Health Sciences Tsukuba University Of Technology
-
Okamoto Takeshi
Department Of Cardiovascular Surgery Niigata City General Hospital
-
Okamoto Eiji
Graduate School Of Systems And Information Engineering Univ. Of Tsukuba
-
OKAMOTO Eiji
Graduate School of Systems and Information Engineering, University of Tsukuba
関連論文
- Subcutaneous Migration of Distal Ventriculoperitoneal Shunt Catheter Caused by Abdominal Fat Pad Shift : Three Case Reports
- Sender Authenticated Key Agreements without Random Oracles
- An ID-SP-M4M Scheme and Its Security Analysis(Signatures,Cryptography and Information Security)
- Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses(Protocol, Cryptography and Information Security)
- A Share-Correctable Protocol for the Shamir Threshod Scheme and Its Application to Participant Enrollment (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- How to Verify the Threshold t of Shamir's (t,n)-Threshold Scheme (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment
- How to Verify the Threshold t of Shamirs (t, n)-Threshold Scheme
- Cell Elongation and Cell Death of Helicobacter pylori Is Modulated by the Disruption of cdrA (Cell Division-Related Gene A)
- Sender Authenticated Key Agreements without Random Oracles
- PHARMACOKINETICS AND PHARMACODYNAMICS OF SUBCUTANEOUS INSULIN INJECTION IN DEPANCREATIZED DOGS
- Ruptured Aneurysm of the Subclavian Artery in a Patient With von Recklinghausen's Disease
- Preparation of Oleic Acid-capped Copper Nanoparticles
- A Simple Way for Preparing Antioxidation Nano-copper Powders
- Effect of Ammonia on the Crystal Morphology of Nickel Oxalate Precipitates and their Thermal Decomposition into Metallic Nickel
- Awake partial sternotomy pacemaker implantation under thoracic epidural anesthesia
- Universal ηT pairing algorithm over arbitrary extension degree (ワイドバンドシステム)
- Universal ηT pairing algorithm over arbitrary extension degree (情報セキュリティ)
- Universal ηT pairing algorithm over arbitrary extension degree (情報理論)
- Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Planarization of GaN(0001) Surface by Photo-Electrochemical Method with Solid Acidic or Basic Catalyst
- Linolenic acid binding by chloroplasts
- Effects of linolenic acid on spinach chloroplast structure
- Defect-Free Planarization of 4H–SiC(0001) Substrate Using Reference Plate
- Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities
- Improvement of Removal Rate in Abrasive-Free Planarization of 4H-SiC Substrates Using Catalytic Platinum and Hydrofluoric Acid
- Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks
- A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment
- Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks