Advertisement

A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy

  • Min-Shiang Hwang
  • Wen-Guey Tzeng
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2662)

Abstract

A new conference key distribution scheme in a in a totally-ordered Hierarchy is proposed in this study. A group of users with a different security class can generate a common secret key over a public channel so that a secure electronic conference can be held. The security classes form a hierarchy such that users in a higher security class can obtain a secret session key with users in the same or lower security classes. However, the opposite situation is not permitted.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  2. 2.
    Chiou, G.H., Chen, W.T.: Secure broadcasting using the secret lock. IEEE Transactions on Software Engineering 15(8), 929–934 (1989)CrossRefGoogle Scholar
  3. 3.
    Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)zbMATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    Ingemarsson, I., Tang, D.T., Wong, C.K.: A conference key distribution system. IEEE Transactions on Information Theory IT-28(5), 714–720 (1982)CrossRefMathSciNetGoogle Scholar
  5. 5.
    Koyama, K.: Secure conference key distribution systems for conspiracy attack. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 449–453. Springer, Heidelberg (1993)CrossRefGoogle Scholar
  6. 6.
    Koyama, K., Ohta, K.: Identity-based conference key distribution system. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 194–202. Springer, Heidelberg (1988)Google Scholar
  7. 7.
    Koyama, K., Ohta, K.: Security of improved identity-based conference key distribution systems. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 11–19. Springer, Heidelberg (1988)Google Scholar
  8. 8.
    Laih, C.S., Harn, L., Lee, J.Y.: A new threshold scheme and its applications on designing the conference key distribution cryptosystem. Information Processing Letters 32(3), 95–99 (1989)CrossRefMathSciNetGoogle Scholar
  9. 9.
    Simbo, A., Kawamura, S.: Cryptanalysis of several conference key distribution schemes. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 155–160. Springer, Heidelberg (1993)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Min-Shiang Hwang
    • 1
  • Wen-Guey Tzeng
    • 2
  1. 1.Graduate Institute of Networking and Communication EngineeringChaoyang University of TechnologyTaichung CountyR.O.C. Taiwan
  2. 2.Department of Computer and Information ScienceNational Chiao-Tung UniversityHsinchuTaiwan, R.O.C.

Personalised recommendations