Security Proof for Distributed Key Distribution Scheme
DOI:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Security for composition of protocols is hotspot of international scope. By using composition method, it is proved that the distributed key distribution scheme introduced by Daza et al is secure. The scheme appends verifiable secret sharing and zero-knowledge proofs to the basic one which fits in the case of passive adversary to prevent from the action of an active adversary.

    Reference
    Related
    Cited by
Get Citation

徐海霞,李宝.分布式密钥分发方案的安全性证妹.软件学报,2005,16(4):570-576

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:July 29,2003
  • Revised:November 17,2003
  • Adopted:
  • Online:
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063