Abstract | ||
---|---|---|
In this paper, we demonstrate the secure integration of a Diffie-Hellman (DH) key exchange into a digital signature scheme (DSS) using either LUC, XTR or GH as crypto schemes. The presented integrated DH-DSS protocols enable efficient and secure authenticated key exchange between two parties. The integration, as first proposed by Arazi, saves one costly computation step and significantly reduces the bandwidth. We prove that the integrated DH-DSS protocols introduced in this paper all resist the known-key attack that Nyberg and Rueppel presented on Arazi's scheme. The presented integrated protocols outperform all existing variants of Arazi's protocol and the combined DH-DSS protocol while providing the same or more security properties |
Year | DOI | Venue |
---|---|---|
2006 | 10.1109/ISIT.2006.261794 | Seattle, WA |
Keywords | Field | DocType |
cryptography,digital signatures,protocols,diffie-hellman key exchange,gh,luc,xtr,crypto schemes,digital signature scheme,integrated dh-like key exchange protocols,secure authenticated key exchange,decision support systems,key exchange,elliptic curve cryptography,diffie hellman key exchange,public key,cryptographic protocols,public key cryptography,security,diffie hellman,bandwidth,resists | Key exchange,XTR,Cryptography,Computer science,Authenticated Key Exchange,Computer network,Digital signature,Bandwidth (signal processing),Security properties,Diffie–Hellman key exchange | Conference |
ISBN | Citations | PageRank |
1-4244-0504-1 | 0 | 0.34 |
References | Authors | |
7 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Katrin Hoeper | 1 | 44 | 6.43 |
Guang Gong | 2 | 1717 | 160.71 |