A Protocol for the Distributed Generation of Random Values and Some Applications

نویسندگان

  • Sebastian Faust
  • Stefan Lucks
چکیده

This paper introduces an efficient method to jointly generate provably random values between a set of n parties P = {P1, . . . , Pn}, where at most t < n 2 are corrupted by a rushing adversary. We call such a scheme a tRVG (random value generation) protocol. The correctness of our scheme, i.e. the randomness of the generated values, can be formally proven under the DDH assumption. In particular, even corrupted parties do not have the chance to bias the outcome to a non-uniform distribution. We then use t-RVG as a building block to develop an efficient protocol to jointly generate k 2 provably random keys for discrete log based cryptosystems. Our protocol is provably secure under the discrete logarithm assumption, if less than n/2 parties are corrupted. Compared to previous protocols for the same purpose, our protocol reduces the dominating factor for the communication costs, the number of reliable broadcasts, by a factor of n. Finally, we show how to use our techniques for Non-Malleable Robust Group Key Exchange.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Green Energy Generation in Buildings: Grid-Tied Distributed Generation Systems (DGS) With Energy Storage Applications to Sustain the Smart Grid Transformation

The challenge of electricity distribution’s upgrade to incorporate new technologies is big, and electric utilities are mandated to work diligently on this agenda, thus making investments to ensure that current networks maintain their electricity supply commitments secure and reliable in face of disruptions and adverse environmental conditions from a variety of sources. The paper presents a new ...

متن کامل

Analysis and Comparison of Load Flow Methods for Distribution Networks Considering Distributed Generation

Conventional passive distribution networks are changing to modern active distribution networks which are not radial. Conventional load flow methods should be modified for new distribution networks analysis. In modern distribution networks distributed generation (DG) units are embedded with conventional and/or renewable resources. DG units are generally modeled as PV or PQ nodes which inject ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006