Abstract.
Key establishment protocols based on hardness assumptions, such as the discrete logarithm problem and the integer factorization problem, are vulnerable to quantum computer attacks, whereas the protocols based on other hardness assumptions, such as the conjugacy search problem and the decomposition search problem, can resist such attacks. The existing protocols based on the hardness assumptions which can resist quantum computer attacks are only passively secure. Compilers are used to convert a passively secure protocol to an actively secure protocol. Compilers involve some tools such as a signature scheme and a collision-resistant hash function. If there are only passively secure protocols but not a signature scheme based on the same assumption, then the application of existing compilers requires the use of such tools based on different assumptions. But the introduction of new tools, based on different assumptions, makes the new actively secure protocol rely on more than one hardness assumption. We offer an approach to derive an actively secure two-party protocol from a passively secure two-party protocol without introducing further hardness assumptions. This serves as a useful formal tool to transform any basic algebraic method of public key cryptography to the real world applicable cryptographic scheme.
© 2012 by Walter de Gruyter Berlin Boston
Articles in the same Issue
- Masthead
- Two-party key establishment: From passive to active security without introducing new assumptions
- Continuous hard-to-invert functions and biometric authentication
- Existence, algorithms, and asymptotics of direct product decompositions, I
- Isomorphism in expanding families of indistinguishable groups
- Search and test algorithms for triple product property triples
- Evolutionary algorithm solution of the multiple conjugacy search problem in groups, and its applications to cryptography
- A Diffie–Hellman key exchange protocol using matrices over noncommutative rings
- No-leak authentication by the Sherlock Holmes method
Articles in the same Issue
- Masthead
- Two-party key establishment: From passive to active security without introducing new assumptions
- Continuous hard-to-invert functions and biometric authentication
- Existence, algorithms, and asymptotics of direct product decompositions, I
- Isomorphism in expanding families of indistinguishable groups
- Search and test algorithms for triple product property triples
- Evolutionary algorithm solution of the multiple conjugacy search problem in groups, and its applications to cryptography
- A Diffie–Hellman key exchange protocol using matrices over noncommutative rings
- No-leak authentication by the Sherlock Holmes method