A Protocol for the Distributed Generation of Random Values and Some Applications
نویسندگان
چکیده
This paper introduces an efficient method to jointly generate provably random values between a set of n parties P = {P1, . . . , Pn}, where at most t < n 2 are corrupted by a rushing adversary. We call such a scheme a tRVG (random value generation) protocol. The correctness of our scheme, i.e. the randomness of the generated values, can be formally proven under the DDH assumption. In particular, even corrupted parties do not have the chance to bias the outcome to a non-uniform distribution. We then use t-RVG as a building block to develop an efficient protocol to jointly generate k 2 provably random keys for discrete log based cryptosystems. Our protocol is provably secure under the discrete logarithm assumption, if less than n/2 parties are corrupted. Compared to previous protocols for the same purpose, our protocol reduces the dominating factor for the communication costs, the number of reliable broadcasts, by a factor of n. Finally, we show how to use our techniques for Non-Malleable Robust Group Key Exchange.
منابع مشابه
Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملGreen Energy Generation in Buildings: Grid-Tied Distributed Generation Systems (DGS) With Energy Storage Applications to Sustain the Smart Grid Transformation
The challenge of electricity distribution’s upgrade to incorporate new technologies is big, and electric utilities are mandated to work diligently on this agenda, thus making investments to ensure that current networks maintain their electricity supply commitments secure and reliable in face of disruptions and adverse environmental conditions from a variety of sources. The paper presents a new ...
متن کاملAnalysis and Comparison of Load Flow Methods for Distribution Networks Considering Distributed Generation
Conventional passive distribution networks are changing to modern active distribution networks which are not radial. Conventional load flow methods should be modified for new distribution networks analysis. In modern distribution networks distributed generation (DG) units are embedded with conventional and/or renewable resources. DG units are generally modeled as PV or PQ nodes which inject ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006