Abstract
A new conference key distribution scheme in a in a totally-ordered Hierarchy is proposed in this study. A group of users with a different security class can generate a common secret key over a public channel so that a secure electronic conference can be held. The security classes form a hierarchy such that users in a higher security class can obtain a secret session key with users in the same or lower security classes. However, the opposite situation is not permitted.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)
Chiou, G.H., Chen, W.T.: Secure broadcasting using the secret lock. IEEE Transactions on Software Engineering 15(8), 929–934 (1989)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)
Ingemarsson, I., Tang, D.T., Wong, C.K.: A conference key distribution system. IEEE Transactions on Information Theory IT-28(5), 714–720 (1982)
Koyama, K.: Secure conference key distribution systems for conspiracy attack. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 449–453. Springer, Heidelberg (1993)
Koyama, K., Ohta, K.: Identity-based conference key distribution system. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 194–202. Springer, Heidelberg (1988)
Koyama, K., Ohta, K.: Security of improved identity-based conference key distribution systems. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 11–19. Springer, Heidelberg (1988)
Laih, C.S., Harn, L., Lee, J.Y.: A new threshold scheme and its applications on designing the conference key distribution cryptosystem. Information Processing Letters 32(3), 95–99 (1989)
Simbo, A., Kawamura, S.: Cryptanalysis of several conference key distribution schemes. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 155–160. Springer, Heidelberg (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hwang, MS., Tzeng, WG. (2003). A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy. In: Kahng, HK. (eds) Information Networking. ICOIN 2003. Lecture Notes in Computer Science, vol 2662. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45235-5_74
Download citation
DOI: https://doi.org/10.1007/978-3-540-45235-5_74
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40827-7
Online ISBN: 978-3-540-45235-5
eBook Packages: Springer Book Archive