Skip to main content

On Classifying Conference Key Distribution Protocols

  • Conference paper
  • First Online:
  • 982 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2119))

Abstract

In this paper, we examine a classification of conference key distribution protocols proposed in [4] and show that no known protocol satisfies the security requirements in class 4, the highest security class of this classification. We show two new attacks on protocols that were believed to belong to the highest security class and show that both protocols in fact belong to class 3. This motivates us to propose a refinement of this classification to allow separating protocols with different security properties while maintaining the classification framework.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Burmester and Y. Desmedt. A secure and efficient conference key distribution system. Advances in Cryptology-Eurocrypt’ 94, Lecture Notes in Computer Science 950, pages 275–286, 1994.

    Chapter  Google Scholar 

  2. M. Burmester, Y. Desmedt, T. Itoh, K. Sakurai, H. Shizuya, and M. Yung. A progress report on subliminal-free channels. Workshop on Information Hiding, 1996.

    Google Scholar 

  3. W. Diffie and M. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, vol. 22, pages 644–654, 1976.

    Article  MATH  MathSciNet  Google Scholar 

  4. S. Saeednia and R. Safavi-Naini. Efficient Identity-Based Conference Key Distribution Protocols. Information Security and Privacy, ACISP’ 98, Lecture Notes in Computer Science 1438, pages 320–331, 1998.

    Chapter  Google Scholar 

  5. G. J. Simmons. The subliminal channel and digital signatures. Advances in Cryptology-Eurocrypt’ 84, Lecture Notes in Computer Science 209, pages 364–178, 1984.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saeednia, S., Safavi-Naini, R., Susilo, W. (2001). On Classifying Conference Key Distribution Protocols. In: Varadharajan, V., Mu, Y. (eds) Information Security and Privacy. ACISP 2001. Lecture Notes in Computer Science, vol 2119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47719-5_6

Download citation

  • DOI: https://doi.org/10.1007/3-540-47719-5_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42300-3

  • Online ISBN: 978-3-540-47719-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics