期刊文献+

一个新的广播信道会议密钥协商协议 被引量:4

A New Conference-Key Agreement Protocol Under the Broadcast Channel
下载PDF
导出
摘要 群组用户试图在开放式网络上进行安全通信时,需运行一个会议密钥协议来支持一个共同的会议密钥K.本文中,利用基于MDS码(Maximum Distance Code,极大最小距离可分码)的秘密共享方案作为基本构件,提出了一个新颖高效、可证明安全的广播信道下会议密钥协商协议.该协议在广义的Diffie-Hellman Problem(DHP)困难假设下,被动攻击者得不到任何有关诚实参与者协商出的会议密钥的信息;且无论存在多少恶意参与者,诚实参与者一定能够协商出一共同的会议密钥. When a group of people want to communicate securely over an open network, they need to run a conference-key establishment protocol to establish a common conference key K such that all their communication thereafter are encrypted with the key K. By using the secret sharing scheme based on the MDS code as the basic component in this paper, we propose a new provably secure conference-key agreement protocol under the broadcast channel. In the protocol, a passive adversary gets no information about the conference-key established by the honest participants under the assumption of general Diffie-Hellman problem; and the honest participants can agree on a common conference-key no matter how many participants are malicious.
出处 《电子学报》 EI CAS CSCD 北大核心 2004年第4期642-644,共3页 Acta Electronica Sinica
基金 国家自然科学基金(No.60073052)
关键词 MDS码 秘密共享 广播信道 会议密钥协商 数字签名 MDS code secret sharing broadcast channel conference-key agreement digital sigature
  • 相关文献

参考文献6

  • 1C C Chang,C H Lin.How to converse securely in a conference [A].proc.IEEE 3th Ann.Int'1 Carnahan Conf [C].Lexingto,Kentucky,1996.42-45.
  • 2C Blundo,A D Santis.Perfectly-secure key distribution for dynamic conference [A].Proc.Advances in Cryptology-Crypto'92[C].Santa Barbara,California,Springer-Verlag,1993.471-486.
  • 3D Steer,L Strawczynski.A secure audio teleconference system [A].Proc.Advances in Cryptology-Crypto'88 [C].Santa Barbara,California,Springer-Verlag,1990.520-528.
  • 4T C Wu.Conference key distribution system with user anonymity based on algebraic approach [J].IEE Proc.Computers and Digital Techniques,1997,144(2):145-148.
  • 5Ingemarsson I.A protocol to set up shared secret schemes without the assistance of a mutually trusted party [A].Proc.Advances in Cryptology-Eurocrypt'90 [C].Aarhus,Denmark,Springer-Verlag,1991.266-282.
  • 6D Boneh,R Venkatesan.Hardness of computing the most significant bits of secret keys in diffie-hellman and related problems [A].Proc.Advances in Crytology-Crypto'96 [C].Santa Barbara,California,Springer-Verlag,1996.129-142.

同被引文献25

  • 1史庭俊,马建峰.一种容错会议密钥分配方案设计与分析[J].扬州大学学报(自然科学版),2004,7(3):41-44. 被引量:2
  • 2蔡永泉,王亚丽.基于身份的会议密钥协商算法[J].计算机工程,2006,32(13):182-184. 被引量:1
  • 3Tzeng W G.A Secure Fault-tolerant Conference Key Agreement Protocol[J].IEEE Transactions on Computers,2002,51 (4):373-379.
  • 4Tseng Y M.An Improved Conference-key Agreement Protocol with Forward Secrecy[J].International Journal of Informatica,2005,16(2):275-284.
  • 5Yi X.Identity-based Fault-tolerant Conference Key Agreement[J].IEEE Transactions on Dependable and Secure Computing,2004,1(3):170-177.
  • 6Cha J C,Cheon J H.An Identity-based Signature from Gap Diffie-Hellman Groups[C].The 6th International Workshop on Practice and Theory in Public Key Cryptography.Berlin:Springer-Veralg,2003:18-30.
  • 7KOYAMA K.Secure conference key distribution schemes for conspiracy attack[C]∥RUEPPEL A.Advances in Cryptology-Eurocrypt '92.Berlin:Springer-Verlag,1993:449-453.
  • 8TZENG W G.A secure fault-tolerant conference key agreement protocol[J].IEEE Transactions on Computers,2002,51(4):373-379.
  • 9TSENG Y M.An improved conference-key agreement protocol with forward secrecy[J].Informatica,2005,16(2):275-284.
  • 10XUN Yi.Identity-based fault-tolerant conference key agreement[J].IEEE Transactions on Dependable and Secure Computing,2004,1(3):170-177.

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部