RUO Principal

Repositorio Institucional de la Universidad de Oviedo

Ver ítem 
  •   RUO Principal
  • Producción Bibliográfica de UniOvi: RECOPILA
  • Tesis
  • Ver ítem
  •   RUO Principal
  • Producción Bibliográfica de UniOvi: RECOPILA
  • Tesis
  • Ver ítem
    • español
    • English
JavaScript is disabled for your browser. Some features of this site may not work without it.

Listar

Todo RUOComunidades y ColeccionesPor fecha de publicaciónAutoresTítulosMateriasxmlui.ArtifactBrowser.Navigation.browse_issnPerfil de autorEsta colecciónPor fecha de publicaciónAutoresTítulosMateriasxmlui.ArtifactBrowser.Navigation.browse_issn

Mi cuenta

AccederRegistro

Estadísticas

Ver Estadísticas de uso

AÑADIDO RECIENTEMENTE

Novedades
Repositorio
Cómo publicar
Recursos
FAQs
Las tesis leídas en la Universidad de Oviedo se pueden consultar en el Campus de El Milán previa solicitud por correo electrónico: buotesis@uniovi.es

Compilers and protocols for key-establishment

Otros títulos:

Compiladores y protocolos para establecimiento de claves

Autor(es) y otros:
Suárez Corona, AdrianaAutoridad Uniovi
Director(es):
Martínez López, ConsueloAutoridad Uniovi; Steinwandt, Rainer
Centro/Departamento/Otros:
Matemáticas, Departamento deAutoridad Uniovi
Palabra(s) clave:

Matemáticas

Fecha de publicación:
2012
Editorial:

Universidad de Oviedo

Descripción física:
157
Resumen:

In this thesis we study key establishment in different settings and compilers adding extra features to existing protocols. Different security models are proposed and several schemes are presented and analysed. In the public key setting, a compiler is proposed in order to add forward secrecy to any existing authenticated group key establishment protocol P. This compiler adds one round and makes use of a forward secure unauthenticated 1-round 2-party key establishment protocol Q. In the identity-based setting, restricting to the two-party case, Identity- Based Non-Interactive Key Distribution (IB-NIKD) is studied, presenting a key-evolving variant. A security model capturing an intuitive form of forward security is proposed and a scheme satisfying this security notion is presented. A key-evolving variant of identity-based encryption can also be defined. We have explored the relation between these two primitives, giving a generic compiler to get forward secure identity-based encryption schemes from forward secure IB-NIKD schemes. If keys have to be established between users without an specific identity but between users possessing certain credentials, attribute-based group key establishment is the most suitable tool. We propose an appropriate security model and a scheme secure in that sense. We construct the protocol from an attribute-based signcryption scheme. A study on how we can realize these schemes has been made: we prove we can generally construct, also in the attribute-based setting, secure signcryption schemes through the encrypt-then-sign paradigm. A cryptanalysis of a two-party key establishment proposed by G. Maze et al. in Advances in Mathematics of Communication is described. We have proved that the session key can be recovered with minor computational effort.

In this thesis we study key establishment in different settings and compilers adding extra features to existing protocols. Different security models are proposed and several schemes are presented and analysed. In the public key setting, a compiler is proposed in order to add forward secrecy to any existing authenticated group key establishment protocol P. This compiler adds one round and makes use of a forward secure unauthenticated 1-round 2-party key establishment protocol Q. In the identity-based setting, restricting to the two-party case, Identity- Based Non-Interactive Key Distribution (IB-NIKD) is studied, presenting a key-evolving variant. A security model capturing an intuitive form of forward security is proposed and a scheme satisfying this security notion is presented. A key-evolving variant of identity-based encryption can also be defined. We have explored the relation between these two primitives, giving a generic compiler to get forward secure identity-based encryption schemes from forward secure IB-NIKD schemes. If keys have to be established between users without an specific identity but between users possessing certain credentials, attribute-based group key establishment is the most suitable tool. We propose an appropriate security model and a scheme secure in that sense. We construct the protocol from an attribute-based signcryption scheme. A study on how we can realize these schemes has been made: we prove we can generally construct, also in the attribute-based setting, secure signcryption schemes through the encrypt-then-sign paradigm. A cryptanalysis of a two-party key establishment proposed by G. Maze et al. in Advances in Mathematics of Communication is described. We have proved that the session key can be recovered with minor computational effort.

URI:
http://hdl.handle.net/10651/13165
Notas Locales:

DT(SE) 2012-106

Colecciones
  • Tesis [7677]
Ficheros en el ítem
Thumbnail
untranslated
Archivo protegido (1.886Mb)
Embargado hasta:2028-01-01
Compartir
Exportar a Mendeley
Estadísticas de uso
Estadísticas de uso
Metadatos
Mostrar el registro completo del ítem
Página principal Uniovi

Biblioteca

Contacto

Facebook Universidad de OviedoTwitter Universidad de Oviedo
El contenido del Repositorio, a menos que se indique lo contrario, está protegido con una licencia Creative Commons: Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Creative Commons Image