A KEY DISTRIBUTION PARADOX

被引:0
|
作者
YACOBI, Y
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The so called, Rabin ''paradox'' is a proof that a given signature system, which is secure under ciphertext only attack is insecure under chosen message attack. The construction that is used to prove the first clause is also used to prove the second. For several years it was believed to be inherent to public key signature systems. A similar problem existed for public key cryptosystems (under chosen ciphertext attack). Trap-door functions were inherent in the construction of the ''paradox.'' In 1984 Goldwasser, Micali and Rivest constructively showed that one can overcome the ''paradox.'' Naor and Yung (1989) resolved the similar problem for public key cryptosystems. Both solution actually solve two problems. They resolve the ''paradox,'' with the strictest definition of security (for a cryptosystem it amounts to the demand that for a given cryptogram c and two messages m0, m1 it should be infeasible to decide whether c resulted from mo or mi with probability significantly greater than half). Both solutions are very complicated. We show that a similar ''paradox'' exists for many key distribution systems, even if non-trapdoor one way functions are used (like in the Diffie-Hellman variations). Using the simple basic definition of security (given the messages exchanged during the protocol it should be impossible to find the resulting session key in probabilistic polynomial time) we show a simple and practical key distribution system which is provably free of the paradox.
引用
收藏
页码:268 / 273
页数:6
相关论文
共 50 条
  • [21] Transcendence and change in Philo of Alexandria. The key to the paradox
    De Luca, Ludovica
    ADAMANTIUS, 2021, 27 : 516 - 517
  • [22] INCOME DISTRIBUTION AS A PECULIAR PUBLIC GOOD - PARADOX OF REDISTRIBUTION AND PARADOX OF UNIVERSAL EXTERNALITY
    NG, YK
    PUBLIC FINANCE-FINANCES PUBLIQUES, 1973, 28 (01): : 1 - 10
  • [23] Convenient key distribution
    Noriaki Horiuchi
    Nature Photonics, 2013, 7 (2) : 84 - 84
  • [24] Quantum key distribution
    不详
    COMPUTER, 2000, 33 (01) : 42 - 42
  • [25] Quantum Key Distribution
    Seshu, Ch.
    GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 : 200 - 209
  • [26] Semiquantum key distribution
    Boyer, Michel
    Gelles, Ran
    Kenigsberg, Dan
    Mor, Tal
    PHYSICAL REVIEW A, 2009, 79 (03):
  • [27] Quantum key distribution
    Ouellette, Jennifer
    Industrial Physicist, 2004, 10 (06): : 22 - 25
  • [28] A Key Verification Protocol for Quantum Key Distribution
    Kurt, Gunes Karabulut
    Ozdemir, Enver
    Ozkirisci, Neslihan Aysen
    Topal, Ozan Alp
    IEEE ACCESS, 2019, 7 : 141386 - 141394
  • [29] Security of a control key in quantum key distribution
    Rehman, Junaid Ur
    Qaisar, Saad
    Jeong, Youngmin
    Shin, Hyundong
    MODERN PHYSICS LETTERS B, 2017, 31 (11):
  • [30] Key Splitting for Random Key Distribution Schemes
    Ehdaie, Mohammad
    Alexiou, Nikos
    Ahmadian, Mahmoud
    Aref, Mohammad Reza
    Papadimitratos, Panos
    2012 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2012,