Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Temporary secret key

As an additional result of initialization, the signer s entity obtains a secret value. It is called skjemp, a temporary secret key, because it may change later. (That is, it is not necessarily a secret key in the sense of Section 5.3.2.) If initialization is not successful, skjemp = e is assumed for simplicity. [Pg.151]

A2, on input (par, pub, sk temp, aux%), first executes F in interaction with sign (as in Definition 7.13a, but in algorithmic notation) The inputs to F are (par, pub, aux X), and skjemp is updated with each application of sign. The results of Step 2 are a new temporary secret key from the last application of sign and the output/of F. Hence this step is denoted by... [Pg.182]

Furthermore, it suffices to define test for the same values pk e PK All as verify. Similarly, a value skjemp can only be an original temporary secret key (as in the requirement on SKJTemp in Definition 7.1) if there exist parameters par = ( 1 , 1 ) as above, a prekey prek e Allj g, and a value mk such that... [Pg.195]

Main key generation On input the parameters and a new prekey prek, N one-time key pairs (sk tempj, mkp based on prek are generated. The values mkj are used as the leaves of a binary tree. The value of each inner node is the hash value of its two children (regarded as one message). The new temporary secret key sk temp consists of the whole tree and a counter for the messages already signed, initialized with zero. But only the final hash value, i.e., the root of the tree, is published as the main public key mk of the new scheme. [Pg.322]

Main key generation is almost identical to that of the one-time scheme A one-time key pair (sk temp, mk) based on prek is chosen, mk is the main public key, and the main public key test is identical. The temporary secret key in the new scheme is sk temp = (sk temp, par, prek,j), where par are the parameters, as usual, and j is a string initialized with d zeros, where N = 2 . It serves as a counter of the number of messages already signed. (The message number i in the previous sense is j + 1, if j is interpreted as a binary number.)... [Pg.326]

The figure shows the temporary secret key after the first real message, mq q, has been signed. The complete new signature on wq o consists of the encircled nodes. [Pg.327]

Let/ = mj, j, sj, mk , s )). Moreover, as the security definition is in functional notation, whereas Construction 10.13 is algorithmic, let the current value skjemp be redefined in terms of the history, i.e., as the result of applying sign to the messages from m, given the original temporary secret key and the random string from sk. ... [Pg.329]

In the long run, only the one-time temporary secret key skjempi is stored at a Node I, but neither the one-time main public key mki nor the one-time signature sp More precisely, mki / t>e deleted when they are no longer needed in the path of any future signature. Hence, when the coimter j is updated toy + 1, and ify denotes the common prefix ofy andy + 1 (as strings), the values at the nodes below Node y 0 and Sj Q are deleted (but mkj Q not yet). [Pg.330]

However, the real message may be contained in the updated one-time temporary secret key... [Pg.330]

One can interleave Steps 1 and 2 so that one never has to store more than two temporary secret keys. [Pg.351]

If, as usual in such schemes, pk is a function of prek and the original temporary secret key skjemp, one can derive one more lower bound on the secret key. [Pg.359]

Remark 11.18. If a scheme with prekey is given and all the preconditions of Theorem 11.15 hold, and if the public key is a function of the original temporary secret key and the prekey, then... [Pg.359]


See other pages where Temporary secret key is mentioned: [Pg.159]    [Pg.193]    [Pg.207]    [Pg.290]    [Pg.294]    [Pg.316]    [Pg.317]    [Pg.325]    [Pg.327]    [Pg.334]    [Pg.351]    [Pg.367]   
See also in sourсe #XX -- [ Pg.151 ]




SEARCH



Original temporary secret key

Secret key

Temporary

© 2024 chempedia.info