Round-efficient conference key agreement protocols with provable security

被引:0
|
作者
Tzeng, WG [1 ]
Tzeng, ZJ [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 30050, Taiwan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. In this paper we consider the distributed conference key (conference key agreement) protocol. We present two round-efficient conference key agreement protocols, which achieve the optimum in terms of the number of rounds. Our protocols are secure against both passive and active adversaries under the random oracle model. They release no useful information to passive adversaries and achieve fault tolerance against any coalition of malicious participants. We achieve the optimal round by transferring an interactive proof system to a non-interactive version, while preserving its security capability.
引用
收藏
页码:614 / 627
页数:14
相关论文
共 50 条
  • [21] Provable implementations of security protocols
    Gordon, Andrew D.
    21ST ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2006, : 345 - 346
  • [22] Constant round group key agreement protocols: A comparative study
    Makri, Eleftheria
    Konstantinou, Elisavet
    COMPUTERS & SECURITY, 2011, 30 (08) : 643 - 678
  • [23] Security of authenticated multiple-key agreement protocols
    Wu, TS
    He, WH
    Hsu, CL
    ELECTRONICS LETTERS, 1999, 35 (05) : 391 - 392
  • [24] Key agreement protocols and their security analysis (Extended abstract)
    Blake-Wilson, S
    Johnson, D
    Menezes, A
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 1997, 1355 : 30 - 45
  • [25] Analysis on Security Proof of Two Key Agreement Protocols
    Zhou, Huihua
    Zheng, Minghui
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 531 - +
  • [26] Security analysis and applications of standard key agreement protocols
    Oh, S
    Kwak, J
    Lee, S
    Won, D
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2003, PT 2, PROCEEDINGS, 2003, 2668 : 191 - 200
  • [27] Security analysis on tripartite authenticated key agreement protocols
    Li Hao
    Dai Jufeng
    Gao Junping
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +
  • [28] Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks
    Dang, Lanjun
    Xu, Jie
    Cao, Xuefei
    Li, Hui
    Chen, Jie
    Zhang, Yueyu
    Fu, Xiaotong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (04)
  • [29] A Provable-Security Mutual Authenticated Key Agreement Protocol for Mobile Communication
    Pan Heng
    Li Jing-Feng
    Zheng Qiu-Sheng
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4786 - +
  • [30] ATwo-party Certificateless Authenticated Key Agreement Protocol with provable security
    Li Gui-ying
    Hou Meng-bo
    Zhao Chuan
    Xu Qiu-liang
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 559 - 563