Abstract
This paper proposes identity-based key distribution systems for generating a common secret conference key for two or more users. Users are connected in a ring, a complete graph, or a star network. Messages among users are authenticated using each user’s identification information. The security of the proposed systems is based on the difficulty of both factoring large numbers and computing discrete logarithms over large finite fields.
Chapter PDF
Similar content being viewed by others
References
SHAMIR, A.: ‘Identity-based cryptosystems and signature schemes’, Proceedings of Crypto-84, Santa Barbara, August 1984, pp47–53
FIAT, A. and SHAMIR, A.: ‘How to prove yourself: Practical solutions to identification and signature problems’, Proceedings of Crypto-86, Santa Barbara, August 1986, pp18-1–18-7
OKAMOTO, E.: ‘Proposal for identity-based key distribution systems’, Electron. Lett., 1986, 22, pp1283–1284
DIFFIE, W., and HELLMAN, M. E.: ‘New directions in cryptography’, IEEE Trans. 1976, IT-22, pp644–654
INGEMARSSON, I, TANG, D. T. and WONG, C. K.: ‘A conference key distribution system’, IEEE Trans. 1982, IT-28, pp714–720
KOYAMA, K.: ‘Identity-based conference key distribution system’, IEE Electron. Lett., May 7, 1987, Vol.23, No.10, pp.495–496.
KOYAMA, K. and OHTA, K.: ‘Identity-based conference key distribution systems in broadcast networks’ IEE Electron. Lett., June 4, 1987, Vol.23, No.12, pp.647–649.
RIVEST, R. L., SHAMIR., A., and ADLEMAN, L.: ‘A method for obtaining digital signatures and public-key cryptosystems’, Commun. ACM, 1978, 21, pp120–126
LENSTRA, Jr. H. W.: ‘Factoring integers with elliptic curves’, preprint, May 1986
COPPERSMITH, D., ODLYZKO, A. M. and SCHROEPPEL, R.: ‘Discrete logarithms in GF(p)’ Algorithmica 1986, 1, pp1–15
YACOBI, Y.: ‘Attack on the Koyama-Ohta identity-based key distribution STAR system’, private communication, July 13, 1987.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1988 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Koyama, K., Ohta, K. (1988). Identity-based conference key distribution systems. In: Pomerance, C. (eds) Advances in Cryptology — CRYPTO ’87. CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48184-2_13
Download citation
DOI: https://doi.org/10.1007/3-540-48184-2_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-18796-7
Online ISBN: 978-3-540-48184-3
eBook Packages: Springer Book Archive