Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Adriana Suárez Corona is active.

Publication


Featured researches published by Adriana Suárez Corona.


cryptology and network security | 2012

Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round

Kashi Neupane; Rainer Steinwandt; Adriana Suárez Corona

A compiler is presented which, in the random oracle model, allows to add perfect forward secrecy to any secure authenticated group key establishment protocol P which has at least one round. The compiler does not modify the session identifier and does not impose changes on the underlying public key infrastructure. Building on a secure unauthenticated 1-round 2-party key establishment Q with perfect forward secrecy as auxiliary input, P is transformed into an authenticated group key establishment protocol with perfect forward secrecy and with one more round than P.


Archive | 2018

The Roll of Dices in Cryptology

Maria Isabel Gonzalez Vasco; Santos González; Consuelo Martínez; Adriana Suárez Corona

Probability plays a fundamental role in complexity theory, which in turn is one of the pillars of modern cryptology. However, security practitioners are not always familiar with probability theory, and thus fail to foresee the impact of (seemingly small) deviations from the theoretical description of a scheme at the implementation level. On the other hand, many cryptographic scenarios involve mutually distrusting parties, which need however to cooperate towards a joint goal. In order to attain assurance of the good behavior of one party, interactive validation methods (also known as interactive proof systems) are employed. Randomness is at the core of such methods, which most often will only provide relative assurance, in the sense that they will establish correctness in a probabilistic way. In this paper we will briefly discuss the role of probability theory within modern cryptology, reviewing probabilistic proof systems as a powerful tool towards efficient protocol design, and provable security, as an invaluable framework for deriving formal security proofs.


Iet Information Security | 2017

Group key exchange protocols withstanding ephemeral-key reveals

Maria Isabel Gonzalez Vasco; Angel L. Pérez del Pozo; Adriana Suárez Corona

When a group key exchange protocol is executed, the session key is typically extracted from two types of secrets: long-term keys (for authentication) and freshly generated (often random) values. The leakage of this latter so-called ephemeral keys has been extensively analysed in the 2-party case, yet very few works are concerned with it in the group setting. The authors provide a generic group key exchange construction that is strongly secure, meaning that the attacker is allowed to learn both long-term and ephemeral keys (but not both from the same participant, as this would trivially disclose the session key). Their design can be seen as a compiler, in the sense that it builds on a 2-party key exchange protocol which is strongly secure and transforms it into a strongly secure group key exchange protocol by adding only one extra round of communication. When applied to an existing 2-party protocol from Bergsma et al., the result is a 2-round group key exchange protocol which is strongly secure in the standard model, thus yielding the first construction with this property.


security and cryptography for networks | 2014

Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption

David Naccache; Rainer Steinwandt; Adriana Suárez Corona; Moti Yung

Reverse Public-Key Encryption (RPKE) is a mode of operation exploiting a weak form of key privacy to provide message privacy. In principle, RPKE offers a fallback mode, if the underlying encryption scheme’s message secrecy fails while a weak form of key privacy survives. To date, all published RPKE constructions suffer from a low bandwidth, and low bandwidth seems naturally inherent to reverse encryption. We show how reverse encryption can, in connection with and as a novel application of anonymous broadcast encryption, achieve high-bandwidth. We point out that by using traditional and reverse encryption simultaneously, a form of crypto-steganographic channel inside a cryptosystem can be provided.


Applicable Algebra in Engineering, Communication and Computing | 2014

Scalable attribute-based group key establishment: from passive to active and deniable

Rainer Steinwandt; Adriana Suárez Corona

A protocol compiler is presented which transforms any unauthenticated (attribute-based) group key establishment protocol into an authenticated attribute-based group key establishment. If the protocol to which the compiler is applied does not make use of long-term secrets, then the resulting protocol is, in addition, deniable. In particular, applying our compiler to an unauthenticated 2-round protocol going back to Burmester and Desmedt results in a 3-round solution for attribute-based group key establishment, offering both forward secrecy and deniability.


Advances in Mathematics of Communications | 2010

Attribute-based group key establishment

Rainer Steinwandt; Adriana Suárez Corona


Designs, Codes and Cryptography | 2012

Identity-based non-interactive key distribution with forward security

Rainer Steinwandt; Adriana Suárez Corona


Advances in Mathematics of Communications | 2011

Cryptanalysis of a 2-party key establishment based on a semigroup action problem

Rainer Steinwandt; Adriana Suárez Corona


IACR Cryptology ePrint Archive | 2010

Attribute-based group key establishment.

Rainer Steinwandt; Adriana Suárez Corona


Information Sciences | 2016

Pitfalls in a server-aided authenticated group key establishment

Maria Isabel Gonzalez Vasco; Angel L. Pérez del Pozo; Adriana Suárez Corona

Collaboration


Dive into the Adriana Suárez Corona's collaboration.

Top Co-Authors

Avatar

Rainer Steinwandt

Florida Atlantic University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kashi Neupane

Atlanta Metropolitan College

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Thomas Eisenbarth

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David Naccache

École Normale Supérieure

View shared research outputs
Researchain Logo
Decentralizing Knowledge