On the KEY PREDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution Problem

  • Tsutomu Matsumoto
  • Hideki Imai
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 293)


To utilize the common-key encryption for the efficient message protection in a large communication network, it is desired to settle the problem of how to distribute the common keys. This paper describes a practical solution called the key predistribution system (KPS, for short), which has been proposed by the present authors. On request, the KPS quickly brings a common key to an arbitrary group of entities in a network. Using the KPS, it is quite easy to construct an enciphered one-way communication system, as well as an enciphered two-way (interactive) communication system. For example, even in a very large public network, the KPS can be applied to realize a practical enciphered electronic mailing service directed to individuals. This paper presents secure and efficient realization schemes for the KPS. This paper also discusses the security issues and the variety of applications of them.


  1. [DH76]
    Diffie, W. and Hellman, M.E., “New directions in cryptology,” IEEE Trans. on Information Theory, Vol. IT-22, No. 6, November 1976, pp.644–654.MathSciNetCrossRefGoogle Scholar
  2. [ISO87]
    ISO/TC68, “Banking-Key management (wholesale),” ISO/DIS 8732, February 1987.Google Scholar
  3. [MI86a]
    Matsumoto, T. and Imai, H., Patent application, July, 1986.Google Scholar
  4. [MI86b]
    Matsumoto, T. and Imai, H., “The Third Key Distribution System,” Proceedings of the 1986 Workshop on Cryptography and Information Security, Yokohama, Japan, August 27, 1986 pp.39–41.Google Scholar
  5. [MI86c]
    Matsumoto, T. and Imai, H., “The Key Predistribution System,” IECE Technical Report TGIT86-54, Institute of Electronics and Communications Engineers of Japan, Vo1.86, No.145, September 18, 1986, pp.29–34.Google Scholar
  6. [MI86d]
    Matsumoto, T. and Imai, H., “A Key Predistribution System Based on Linear Algebra,” Proceedings of the 9th Symposium on Information Theory and Its Applications, Akakura, Japan, October 29, 1986, pp.713–718.Google Scholar
  7. [S84]
    Shamir, A., “Identity-Based Cryptosystems and Signature Schemes,” Advances in Cryptology Proceedings of CRYPTO84, Springer LNCS 196, 1985, pp.47–53.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1988

Authors and Affiliations

  • Tsutomu Matsumoto
    • 1
  • Hideki Imai
    • 1
  1. 1.Division of Electrical and Computer EngineeringYokohama National UniversityHodogaya, YokohamaJapan

Personalised recommendations