Unconditional secure conference key distribution schemes with disenrollment capability

被引:2
|
作者
Blundo, C [1 ]
Cresti, A
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
[2] Univ Rome La Sapienza, Dipartimento Sci Informaz, I-00198 Rome, Italy
关键词
conference key distribution; disenrollment; information theory;
D O I
10.1016/S0020-0255(99)00074-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A conference key distribution scheme with disenrollment capability is a method to distribute pieces of information among a set of users in such a way that each group of them can compute a common key to be used for secure communication, In such a scheme any user can be disenrolled. After each disenrollment, although the disenrolled user reveals his private information, the security of the scheme remains unchanged. The scheme is unconditional secure if any adversary coalition has no information on the common key even though it has access to an infinite computational power, In this paper we model the problem of unconditionally secure conference key distribution schemes with disenrollment capability using an information theoretical framework. We prove tight lower bounds on the size of information each user in the scheme has to keep secret, (C) 1999 Elsevier Science Inc. All rights reserved.
引用
收藏
页码:113 / 130
页数:18
相关论文
共 50 条
  • [1] Unconditional secure conference key distribution schemes with disenrollment capability
    Dipto. di Info. Ed Applicazioni, Univ. di Salerno, 84081 , Baronissi, Italy
    不详
    Inf Sci, 1 (113-130):
  • [2] CONFERENCE KEY DISTRIBUTION SCHEMES FOR SECURE DIGITAL MOBILE COMMUNICATIONS
    HWANG, MS
    YANG, WP
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1995, 13 (02) : 416 - 420
  • [3] Authenticated conference key distribution scheme and secure broadcast scheme with the capability to correct errors
    Xu, Shengbo
    Wang, Xinmei
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 1998, 26 (01): : 102 - 104
  • [4] Secure and distributed conference-key distribution
    Guo, YB
    Wang, YD
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2959 - 2962
  • [5] Unconditionally secure dynamic conference key distribution
    Desmedt, Y
    Viswanathan, V
    1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 383 - 383
  • [6] Unconditional secure two-way quantum dense key distribution
    Lue Hua
    Chen Ai-Xi
    Yan Xu-Dong
    CHINESE PHYSICS, 2007, 16 (10): : 2862 - 2866
  • [7] Secure and efficient conference key distribution scheme
    Yuan, Ding
    Fan, Ping-Zhi
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2002, 37 (04):
  • [8] Resilient LKH: Secure multicast key distribution schemes
    Safavi-Naini, Reihaneh
    Wang, Huaxiong
    Wong, Duncan S.
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2006, 17 (05) : 1205 - 1221
  • [9] On the design of a secure anonymous conference key distribution system
    Wu, TC
    Hwang, BR
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 1997, 12 (04): : 239 - 244
  • [10] Conference key distribution schemes for portable communication systems
    Chang, CC
    Huang, PC
    Lee, WB
    COMPUTER COMMUNICATIONS, 1999, 22 (12) : 1160 - 1164