A Novel Conference Key Distribution System with Re-keying Protocol

  • Hui-Feng Huang
  • Chin-Chen Chang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3597)


A conference key distribution system is designed to establish a common secret key so that a group of people are able to hold a conference securely. However, the existing conference distribution schemes do not consider the situation that a user may be in a conference for only a period of time. If a user resigned from this session and premeditatedly eavesdropped on data transmissions, he could then also decrypt the data. Thus, all messages are likely to be compromised during the span of the system. In this paper, we propose a new conference key distribution scheme with re-keying protocol in which all conference keys in a conference are different for each time period. Our goal is to minimize the potential damages over a public network. Once the time period has elapsed the participants in a conference cannot access any messages with previously used common keys. Therefore, if a user resigns from a conference and premeditatedly eavesdrops on later messages, he cannot decrypt the message with his old keys. Moreover, in our proposed scheme, we do not require a chairman (or trusted center) and any interactive protocols among all participants in order to construct the common conference key for each time period. It can be easily implemented to a dynamic conference key distribution system because other participants’ information items of the system need not be immediately changed once a participant is added or deleted.


Discrete Logarithm Distribution Scheme Interactive Communication Information Item Interactive Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Berkovits, S.: How to broadcast a secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 535–541. Springer, Heidelberg (1991)Google Scholar
  2. 2.
    Chang, C.C., Wu, T.C., Chen, C.P.: The Design of a Conference Key Distribution System. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 459–466. Springer, Heidelberg (1993)Google Scholar
  3. 3.
    Hwang, M.S., Yang, W.P.: Conference Key Distribution Schemes for Secure Digital Mobile Communications. IEEE Journal on Selected Areas in Communications 13, 416–420 (1995)CrossRefGoogle Scholar
  4. 4.
    ElGamal, T.: A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory 31, 469–472 (1985)zbMATHCrossRefMathSciNetGoogle Scholar
  5. 5.
    Ingemarsson, I., Tang, D.T., Wong, C.K.: A Conference Key Distribution System. IEEE Transactions on Information Theory 28, 714–720 (1982)zbMATHCrossRefMathSciNetGoogle Scholar
  6. 6.
    Steer, D., Strawczynski, L., Diffie, W., Wiener, M.: A secure audio teleconference system. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 520–528. Springer, Heidelberg (1990)Google Scholar
  7. 7.
    Tseng, Y.M., Jan, J.K.: A Conference Key Distribution System. Computer Communications 22, 749–754 (1999)CrossRefGoogle Scholar
  8. 8.
    Tzeng, W.G.: A Secure Fault-Tolerant Conference-Key Agreement Protocol. IEEE Transactions on Computers 51, 373–379 (2002)CrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Hui-Feng Huang
    • 1
  • Chin-Chen Chang
    • 2
  1. 1.Department of Information ManagementNational Taichung Institute of TechnologyTaichungTaiwan
  2. 2.Department of Information Engineering and Computer ScienceFeng Chia UniversityTaichungTaiwan

Personalised recommendations