Capture Resilient ElGamal Signature Protocols
نویسندگان
چکیده
One of the fundamental problems of public key cryptography is protecting the private key. Private keys are too long to be remembered by the user, and storing them in the device which performs the private key operation is insecure as long as the device is subject to capture. In this paper, we propose server-assisted protocols for the ElGamal signature scheme which make the system capture resilient in the sense that the security of the system is not compromised even if the signature device is captured. The protocols also have a key disabling feature which allows a user to disable the device’s private key in case both the device and the password of the user are compromised simultaneously.
منابع مشابه
Efficient deniable authentication protocol based on generalized ElGamal signature scheme
An efficient and non-interactive deniable authentication protocol is presented to enable a receiver to identify the source of a given message, but not prove the identity of the sender to a third party. The proposed protocol is based on the generalized ElGamal signature scheme and is more efficient than the previous protocols. We show that if an adversary could forge signatures of this protocol,...
متن کاملE-MultiSEC: A New ElGamal based Asymmetric Authentication Technique for WSNs
Providing security service in wireless sensor networks using authentication techniques turns out to be a non-trivial task due to network resource constraints. To improve the network security it is often necessary to combine intrusion detection techniques with the key management protocols. Several symmetric key cryptographic solutions proposed earlier are inefficient against node compromise atta...
متن کاملExposure - Resilient Cryptography 7 February 2007 Lecture 4 Lecturer :
In this lecture, we give a high-level tour of DL-Based Threshold Cryptography. We begin with distributed generation of discrete log keys. We describe two protocols: (1) parallel Feldman and its (limited) security properties – good for adaptive Pedersen VSS, but not when the simulator needs to force the outcome (due to rushing), and (2) parallel Pedersen followed by the first protocol. Next, we ...
متن کاملAn Implicit ELGamal Digital Signature Scheme
This paper introduced a detail ElGamal digital signature scheme, and mainly analyzed the existing problems of the ElGamal digital signature scheme. Then improved the scheme according to the existing problems of ElGamal digital signature scheme, and proposed an implicit ElGamal type digital signature scheme with the function of message recovery. As for the problem that message recovery not being...
متن کاملLogarithms in Real-quadratic Orders
We generalize and improve the schemes of [4]. We introduce analogues of exponentiation and cliscrele logarithms in the principle cycle of real quadratic orders. This enables us t o implement many cryptographic protocols based on discrete logarithms, e.g. a variant of the signature scheme of ElGamal [S].
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006