Round-efficient conference key agreement protocols with provable security

被引:0
|
作者
Tzeng, WG [1 ]
Tzeng, ZJ [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 30050, Taiwan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. In this paper we consider the distributed conference key (conference key agreement) protocol. We present two round-efficient conference key agreement protocols, which achieve the optimum in terms of the number of rounds. Our protocols are secure against both passive and active adversaries under the random oracle model. They release no useful information to passive adversaries and achieve fault tolerance against any coalition of malicious participants. We achieve the optimal round by transferring an interactive proof system to a non-interactive version, while preserving its security capability.
引用
收藏
页码:614 / 627
页数:14
相关论文
共 50 条
  • [31] Security-provable mutually authenticated key agreement protocol in mobile communication
    Deng, Hong-Su
    Zuo, Yi-Qiang
    Zhao, Yi-Ming
    Bao, Zhen-Dong
    Ruan Jian Xue Bao/Journal of Software, 2003, 14 (08): : 1489 - 1494
  • [32] Formal design of efficient authentication and key agreement protocols
    Jacobson, G
    SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 96 - 113
  • [33] Secure and efficient key agreement protocols for wireless communication
    Yang, HK
    An, YH
    Choi, J
    2005 Asia-Pacific Conference on Communications (APCC), Vols 1& 2, 2005, : 520 - 524
  • [34] Security weaknesses of a signature scheme and authenticated key agreement protocols
    Nose, Peter
    INFORMATION PROCESSING LETTERS, 2014, 114 (03) : 107 - 115
  • [35] High Key Rate Quantum Conference Key Agreement With Unconditional Security
    Cao, Xiao-Yu
    Lu, Yu-Shuo
    Li, Zhao
    Gu, Jie
    Yin, Hua-Lei
    Chen, Zeng-Bing
    IEEE ACCESS, 2021, 9 : 128870 - 128876
  • [36] On the security of Girault key agreement protocols against active attacks
    Oh, SH
    Mambo, M
    Shizuya, H
    Won, DH
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (05): : 1181 - 1189
  • [37] Security analysis of password-authenticated key agreement protocols
    Shim, KA
    Seo, SH
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 49 - 58
  • [38] Questioning the Security of Three Recent Authentication and Key Agreement Protocols
    Rahmani, Amir Masoud
    Mohammadi, Mokhtar
    Rashidi, Shima
    Lansky, Jan
    Mildeova, Stanislava
    Safkhani, Masoumeh
    Kumari, Saru
    Hosseinzadeh, Mehdi
    IEEE ACCESS, 2021, 9 : 98204 - 98217
  • [39] A Round-Efficient Distributed Betweenness Centrality Algorithm
    Hoang, Loc
    Pontecorvi, Matteo
    Dathathri, Roshan
    Gill, Gurbinder
    You, Bozhi
    Pingali, Keshav
    Ramachandran, Vijaya
    PROCEEDINGS OF THE 24TH SYMPOSIUM ON PRINCIPLES AND PRACTICE OF PARALLEL PROGRAMMING (PPOPP '19), 2019, : 272 - 286
  • [40] On key agreement and conference key agreement
    Boyd, C
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 294 - 302