A conference key distribution system based on cross-product
نویسندگان
چکیده
منابع مشابه
Anonymous and dynamic conference-key distribution system
In order to hold secure electronic conference in Communication networks via insecure channels, a conference key distribution system should be constructed. The conference key distribution system (CKDS) is used for distributing a conference key shared among the participants of the conference and hence secure communications are achieved. In this paper, by using the secret sharing scheme based on t...
متن کاملA Secure and Efficient Conference Key Distribution System (Extended Abstract)
We present a practical interactive conference key distribution system based on public keys, which is 'proven' secure provided the Diffie-Hellman problem is intractable. The system authenticates the users and allows them to compute their own conference key. A certain number of interactions is required, but the number of rounds is independent of the number of conference users. All users involved ...
متن کاملA Secure and Efficient Conference Key Distribution System
We present a practical interactive conference key distribution system based on public keys, which is ‘proven’ secure provided the Diffie-Hellman problem is intractable. The system authenticates the users and allows them to compute their own conference key. A certain number of interactions is required, but the number of rounds is independent of the number of conference users. All users involved ...
متن کاملSecurity of Improved Identity-Based Conference Key Distribution Systems
At Crypto-87 conference, we proposed identity-based key distribution systems for generating a common secret conference key for two or more users. Protocols were shown for three configurations: a ring, a complete graph, and a star. Yacobi has made an impersonation attack on the protocols for the complete graph and star networks. This paper proposes improved identity-based key distribution protoc...
متن کاملComments on two anonymous conference key distribution systems
In this paper we consider the security of two recently proposed anonymous conference key distribution schemes. We show that neither scheme is as practical as the authors claim and that, in certain circumstances, both schemes also suffer from security vulnerabilities. We also show that the attack described in one paper is invalid.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Mathematics with Applications
سال: 1993
ISSN: 0898-1221
DOI: 10.1016/0898-1221(93)90246-r