Abstract
At the Eurocrypt'88 meeting, Koyama and Ohta proposed a conference key distribution scheme, which was an improved protocol of their earlier version. The authors show that their schemes, constructed for star and complete graph networks, are not secure. Another key distribution scheme, which can be used for conference key distribution, proposed at the Globecom'90 meeting by Chikazawa and Inoue, is not secure either.
This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
References
K.Koyama and K.Ohta, “Security of Improved Identity-based Conference Key Distribution Systems”, Lecture Notes in Computer Science (LNCS), Advances in Cryptology — EUROCRYPT'88, Springer-Verlag, pp.11–19 (1988).
K.Koyama and K.Ohta, “Identity-based conference key distribution systems”, LNCS, Advances in Cryptology — CRYPTO'87, Springer-Verlag, pp.175–184 (1987).
Y.Yacobi, “Attack on the Koyama-Ohta identity based key distribution scheme”, LNCS, Advances in Cryptology — CRYPTO'87, Springer-Verlag, pp.429–433 (1987).
T.Chikazawa and T.Inoue, “A new key sharing system for global telecommunications”, Proceedings of GLOBECOM'90, pp.1069–1072 (1990).
T.Okamoto and K.Ohta, “How to utilize the randomness of zero-knowledge proofs”, Proc. of CRYPTO'90 (1990).
W.Diffie and M.Hellman, “New directions in cryptography”, IEEE Trans. of Inf. Theory, IT-22, 6, pp.644–654 (1976).
A.Fiat and A.Shamir, “How to prove yourself: Practical solutions to identification and signature problems”, LNCS, Advances in Cryptology — CRYPTO'86, Springer-Verlag, pp.186–194 (1986).
U.Feige, A.Fiat and A.Shamir, “Zero knowledge proofs if identity”, STOC, pp.210–217 (1987).
K.Ohta and T.Okamoto, “A modification of the Fiat-Shamir scheme”, LNCS, Advances in Cryptology — CRYPTO'88, Springer-Verlag, pp.232–243 (1988).
L.C.Guillou and J.J.Quisquater, “A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory”, LNCS, Advances in Cryptology — EUROCRYPT'88, Springer-Verlag, pp.123–128 (1988).
K.Ohta, “Efficient identification and signature scheme”, Electronics Letters, 24, 2, pp.115–116 (1988).
G.J.Simmons, “A ‘weak’ privacy protocol using the RSA crypto algorithm”, Cryptologia, 7, 2, pp.180–182 (1983).
T.Okamoto and K.Ohta, “Disposable zero-knowledge authentications and their applications to untraceable electronic cash”, LNCS, Advances in Cryptology — CRYPTO'89, Springer-Verlag, pp.481–496 (1989).
S.Kawamura and A.Shimbo, “A one-way key distribution scheme based on a Fiat-Shamir digital signature”, (written in Japanese) IEICE, 1991 Spring National Convention Record, A-292 (1991).
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1993 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shimbo, A., Kawamura, Si. (1993). Cryptanalysis of several conference key distribution schemes. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds) Advances in Cryptology — ASIACRYPT '91. ASIACRYPT 1991. Lecture Notes in Computer Science, vol 739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57332-1_22
Download citation
DOI: https://doi.org/10.1007/3-540-57332-1_22
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57332-6
Online ISBN: 978-3-540-48066-2
eBook Packages: Springer Book Archive