Abstract
In this paper, a conference key multicasting scheme is proposed and analyzed. Each Network user U i is associated with a key pair (x i , Y i ), where x i is a secret key and y i is a public key. A sealed lock is constructed from the public keys so that conference key can be enciphered by a chairperson and broadcasted to users in the network system, while only the authorized participants can recover the conference key. The packed sum property aspect of the well known knapsack problem together with the concept of secret sharing is utilized to accomplish the construction of a sealed lock.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
G. H. Chiou and W. T. Chen, “Secure Broadcasting Using the Secure Lock,” IEEE Trans. Software Engineering, Vol. 15, No. 8, 1989, pp. 929–934.
W. Diffie and M. E. Hellman, “New Directions in Cryptography,” IEEE Trans. Information Theory, Vol. 22, No. 6, 1976, pp. 644–654.
T. Elgarmal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Trans. Information Theory, Vol. 31, No. 4, 1985, pp. 469–472.
I. Ingemarsson, D. T. Tang and C. K. Wang, “A Conference Key Distribution System,” IEEE Trans. Information Theory, Vol. 28, No. 5, 1982, pp. 714–720.
C. H. Lin, C. C. Chang and R. C. T. Lee, “A Conference Key Broadcasting System Using Sealed Locks,” Information Systems. Vol. 17, No. 4, 1992, pp. 323–328.
S. Martello and P. Toth, Knapsack Problem: Algorithms and Computer Implementations, John Wiley & Sons, England, 1990.
R. C. Merkle and M. E. Hellman, “Hiding Information and Signatures in Trapdoor Knapsacks,” IEEE Trans. Information Theory, Vol. 24, No. 5, 1978, pp. 525–530.
A. Shamir, “Embedding Cryptography Trapdoors in Arbitrary Knapsack Systems,” Information Processing Letters, Vol. 17, No. 2, 1983, pp. 77–79.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, SJ., Chang, JF. (1999). A Conference Key Multicasting Scheme Using Knapsack and Secret Sharing. In: Bench-Capon, T.J., Soda, G., Tjoa, A.M. (eds) Database and Expert Systems Applications. DEXA 1999. Lecture Notes in Computer Science, vol 1677. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48309-8_35
Download citation
DOI: https://doi.org/10.1007/3-540-48309-8_35
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66448-2
Online ISBN: 978-3-540-48309-0
eBook Packages: Springer Book Archive