Skip to main content

Security of the center in key distribution schemes

  • Conference paper
  • First Online:
Advances in Cryptology — ASIACRYPT'94 (ASIACRYPT 1994)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 917))

Included in the following conference series:

Abstract

This paper studies the security of the trusted center in a b-secure t-group key distribution scheme in which the center issues a private information v i , ∈ V to each user i based on the center secret s ∈ S. User i can obtain the common key k ∈ K with t−1 other users from v i so that any dishonest b users cannot learn any key they should not know. First, we show how to distribute the power of the center to m centers so that, even if l−1 centers and b users collaborate, they cannot learn any key that b users should not know. Next, we prove that

$$\log _2 |S| \geqslant \left( {\begin{array}{*{20}c}{b + t} \\t \\\end{array} } \right)\log _2 |K|$$

.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R.Blom: An Optimal Class of Symmetric Key Generation Systems. Eurocrypt'84, pp.335–338 (1984)

    Google Scholar 

  2. C.Blundo, A.De Santis, A.Herzberg, S.Kutten, U.Vaccaro and M.Yung: Perfectly-Secure Key Distribution for Dynamic Conferences. Crypto'92 (1992)

    Google Scholar 

  3. A.Beimel and B.Chor: Interaction in Key Distribution Schemes. Crypto'93 (1993)

    Google Scholar 

  4. L.Gong and D.J.Wheeler: A matrix Key-Distribution Scheme. Journal of Cryptology, 2, pp. 51–59 (1990)

    Google Scholar 

  5. T.Matsumoto and I.Imai: On the Key Predistribution Systems: A Practical Solution to the Key Distribution Problem. Crypto'87, pp.185–193 (1988)

    Google Scholar 

  6. E.Okamoto and K.Tanaka: Key Distribution System Based on Identification Information. IEEE J. on Selected Areas in Communications, 7(4), pp. 481–485 (1989)

    Google Scholar 

  7. S.Tsujii and J.Chao: A New ID-based Key Sharing Scheme. Crypto'91, pp.288–299 (1991)

    Google Scholar 

  8. Y.Desmedt and Y.Frankel: Shared Generation of Authenticators and Signatures. In Advances in Cryptology. Proc. of Crypto'91, pp.11–15 (1991)

    Google Scholar 

  9. R.G.Gallager: Information Theory and Reliable Communications. John Wiley & Sons, New York, NY (1968)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Josef Pieprzyk Reihanah Safavi-Naini

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kurosawa, K., Okada, K., Sakano, K. (1995). Security of the center in key distribution schemes. In: Pieprzyk, J., Safavi-Naini, R. (eds) Advances in Cryptology — ASIACRYPT'94. ASIACRYPT 1994. Lecture Notes in Computer Science, vol 917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0000445

Download citation

  • DOI: https://doi.org/10.1007/BFb0000445

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-59339-3

  • Online ISBN: 978-3-540-49236-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics