Skip to main content

A Novel Conference Key Distribution System with Re-keying Protocol

  • Conference paper
Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 (HSI 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3597))

Included in the following conference series:

Abstract

A conference key distribution system is designed to establish a common secret key so that a group of people are able to hold a conference securely. However, the existing conference distribution schemes do not consider the situation that a user may be in a conference for only a period of time. If a user resigned from this session and premeditatedly eavesdropped on data transmissions, he could then also decrypt the data. Thus, all messages are likely to be compromised during the span of the system. In this paper, we propose a new conference key distribution scheme with re-keying protocol in which all conference keys in a conference are different for each time period. Our goal is to minimize the potential damages over a public network. Once the time period has elapsed the participants in a conference cannot access any messages with previously used common keys. Therefore, if a user resigns from a conference and premeditatedly eavesdrops on later messages, he cannot decrypt the message with his old keys. Moreover, in our proposed scheme, we do not require a chairman (or trusted center) and any interactive protocols among all participants in order to construct the common conference key for each time period. It can be easily implemented to a dynamic conference key distribution system because other participants’ information items of the system need not be immediately changed once a participant is added or deleted.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Berkovits, S.: How to broadcast a secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 535–541. Springer, Heidelberg (1991)

    Google Scholar 

  2. Chang, C.C., Wu, T.C., Chen, C.P.: The Design of a Conference Key Distribution System. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 459–466. Springer, Heidelberg (1993)

    Google Scholar 

  3. Hwang, M.S., Yang, W.P.: Conference Key Distribution Schemes for Secure Digital Mobile Communications. IEEE Journal on Selected Areas in Communications 13, 416–420 (1995)

    Article  Google Scholar 

  4. ElGamal, T.: A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory 31, 469–472 (1985)

    Article  MATH  MathSciNet  Google Scholar 

  5. Ingemarsson, I., Tang, D.T., Wong, C.K.: A Conference Key Distribution System. IEEE Transactions on Information Theory 28, 714–720 (1982)

    Article  MATH  MathSciNet  Google Scholar 

  6. Steer, D., Strawczynski, L., Diffie, W., Wiener, M.: A secure audio teleconference system. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 520–528. Springer, Heidelberg (1990)

    Google Scholar 

  7. Tseng, Y.M., Jan, J.K.: A Conference Key Distribution System. Computer Communications 22, 749–754 (1999)

    Article  Google Scholar 

  8. Tzeng, W.G.: A Secure Fault-Tolerant Conference-Key Agreement Protocol. IEEE Transactions on Computers 51, 373–379 (2002)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Huang, HF., Chang, CC. (2005). A Novel Conference Key Distribution System with Re-keying Protocol. In: Shimojo, S., Ichii, S., Ling, TW., Song, KH. (eds) Web and Communication Technologies and Internet-Related Social Issues - HSI 2005. HSI 2005. Lecture Notes in Computer Science, vol 3597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11527725_29

Download citation

  • DOI: https://doi.org/10.1007/11527725_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-27830-6

  • Online ISBN: 978-3-540-31808-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics