Round-efficient conference key agreement protocols with provable security

被引:0
|
作者
Tzeng, WG [1 ]
Tzeng, ZJ [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 30050, Taiwan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. In this paper we consider the distributed conference key (conference key agreement) protocol. We present two round-efficient conference key agreement protocols, which achieve the optimum in terms of the number of rounds. Our protocols are secure against both passive and active adversaries under the random oracle model. They release no useful information to passive adversaries and achieve fault tolerance against any coalition of malicious participants. We achieve the optimal round by transferring an interactive proof system to a non-interactive version, while preserving its security capability.
引用
收藏
页码:614 / 627
页数:14
相关论文
共 50 条
  • [41] A novel pairing-free certificateless authenticated key agreement protocol with provable security
    Haiyan SUN
    Qiaoyan WEN
    Hua ZHANG
    Zhengping JIN
    Frontiers of Computer Science, 2013, 7 (04) : 544 - 557
  • [42] A novel pairing-free certificateless authenticated key agreement protocol with provable security
    Sun, Haiyan
    Wen, Qiaoyan
    Zhang, Hua
    Jin, Zhengping
    FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (04) : 544 - 557
  • [43] A novel pairing-free certificateless authenticated key agreement protocol with provable security
    Haiyan Sun
    Qiaoyan Wen
    Hua Zhang
    Zhengping Jin
    Frontiers of Computer Science, 2013, 7 : 544 - 557
  • [44] Efficient group Diffie-Hellman key agreement protocols
    Harn, Lein
    Lin, Changlu
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1972 - 1980
  • [45] Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
    Barbosa, Manuel
    Farshim, Pooya
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 235 - 253
  • [46] Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security
    Moon, Jongho
    Song, Taeui
    Lee, Donghoon
    Lee, Youngsook
    Won, Dongho
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 72 - 77
  • [47] Provable security for public key schemes
    Pointcheval, D
    CONTEMPORARY CRYPTOLOGY, 2005, : 133 - 190
  • [48] Key control in key agreement protocols
    Mitchell, CJ
    Ward, M
    Wilson, P
    ELECTRONICS LETTERS, 1998, 34 (10) : 980 - 981
  • [49] One round identity-based authenticated conference key agreement protocol
    Kim, JS
    Kim, HC
    Ha, KJ
    Yoo, KY
    UNIVERSAL MULTISERVICE NETWORKS, PROCEEDINGS, 2004, 3262 : 407 - 416
  • [50] Multiparty key agreement protocols
    Pieprzyk, J
    Li, CH
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2000, 147 (04): : 229 - 236