Skip to main content

Cryptanalysis of several conference key distribution schemes

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 739))

Abstract

At the Eurocrypt'88 meeting, Koyama and Ohta proposed a conference key distribution scheme, which was an improved protocol of their earlier version. The authors show that their schemes, constructed for star and complete graph networks, are not secure. Another key distribution scheme, which can be used for conference key distribution, proposed at the Globecom'90 meeting by Chikazawa and Inoue, is not secure either.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. K.Koyama and K.Ohta, “Security of Improved Identity-based Conference Key Distribution Systems”, Lecture Notes in Computer Science (LNCS), Advances in Cryptology — EUROCRYPT'88, Springer-Verlag, pp.11–19 (1988).

    Google Scholar 

  2. K.Koyama and K.Ohta, “Identity-based conference key distribution systems”, LNCS, Advances in Cryptology — CRYPTO'87, Springer-Verlag, pp.175–184 (1987).

    Google Scholar 

  3. Y.Yacobi, “Attack on the Koyama-Ohta identity based key distribution scheme”, LNCS, Advances in Cryptology — CRYPTO'87, Springer-Verlag, pp.429–433 (1987).

    Google Scholar 

  4. T.Chikazawa and T.Inoue, “A new key sharing system for global telecommunications”, Proceedings of GLOBECOM'90, pp.1069–1072 (1990).

    Google Scholar 

  5. T.Okamoto and K.Ohta, “How to utilize the randomness of zero-knowledge proofs”, Proc. of CRYPTO'90 (1990).

    Google Scholar 

  6. W.Diffie and M.Hellman, “New directions in cryptography”, IEEE Trans. of Inf. Theory, IT-22, 6, pp.644–654 (1976).

    Google Scholar 

  7. A.Fiat and A.Shamir, “How to prove yourself: Practical solutions to identification and signature problems”, LNCS, Advances in Cryptology — CRYPTO'86, Springer-Verlag, pp.186–194 (1986).

    Google Scholar 

  8. U.Feige, A.Fiat and A.Shamir, “Zero knowledge proofs if identity”, STOC, pp.210–217 (1987).

    Google Scholar 

  9. K.Ohta and T.Okamoto, “A modification of the Fiat-Shamir scheme”, LNCS, Advances in Cryptology — CRYPTO'88, Springer-Verlag, pp.232–243 (1988).

    Google Scholar 

  10. L.C.Guillou and J.J.Quisquater, “A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory”, LNCS, Advances in Cryptology — EUROCRYPT'88, Springer-Verlag, pp.123–128 (1988).

    Google Scholar 

  11. K.Ohta, “Efficient identification and signature scheme”, Electronics Letters, 24, 2, pp.115–116 (1988).

    Google Scholar 

  12. G.J.Simmons, “A ‘weak’ privacy protocol using the RSA crypto algorithm”, Cryptologia, 7, 2, pp.180–182 (1983).

    Google Scholar 

  13. T.Okamoto and K.Ohta, “Disposable zero-knowledge authentications and their applications to untraceable electronic cash”, LNCS, Advances in Cryptology — CRYPTO'89, Springer-Verlag, pp.481–496 (1989).

    Google Scholar 

  14. S.Kawamura and A.Shimbo, “A one-way key distribution scheme based on a Fiat-Shamir digital signature”, (written in Japanese) IEICE, 1991 Spring National Convention Record, A-292 (1991).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hideki Imai Ronald L. Rivest Tsutomu Matsumoto

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shimbo, A., Kawamura, Si. (1993). Cryptanalysis of several conference key distribution schemes. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds) Advances in Cryptology — ASIACRYPT '91. ASIACRYPT 1991. Lecture Notes in Computer Science, vol 739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57332-1_22

Download citation

  • DOI: https://doi.org/10.1007/3-540-57332-1_22

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57332-6

  • Online ISBN: 978-3-540-48066-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics