Efficient Key Distribution for Closed Meetings in the Internet

  • Fuwen Liu
  • Hartmut Koenig
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3677)


Many emerging group oriented and collaborative applications such as audio/video conferences use the peer-to-peer paradigm. Confidentiality is an often demanded feature for such applications, e.g. in business meetings, to provide group privacy. To assure confidentiality in a meeting the partners have to agree upon a common secret key for encrypting their communication. This requires efficient distributed group key exchange protocols. We present the principle of the key distribution protocol TKD which achieves a lower key refreshment delay compared to existing key exchange protocols.


Communication Round Collaborative Application Token Holder Distribute System Security Symposium Closed Meeting 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Kim, Y., Perrig, A., Tsudik, G.: Tree-based Group Key Agreement. ACM Transactions on Information Systems Security (TISSEC) 7(1), 60–96 (2004)CrossRefGoogle Scholar
  2. 2.
    Rodeh, O., Birman, K.P., Dolev, D.: Optimized Group Rekey for Group Communication Systems. In: Network and Distributed System Security Symposium (NDSS 2000), pp. 39–48 (2000)Google Scholar
  3. 3.
    The BRAVIS video conference system,
  4. 4.
    Kaufman, C.: Internet Key Exchange (IKEv2) Protocol, draft-ietf-ipsec-ikev2-17.txt (September 2004)Google Scholar
  5. 5.
    Rescorla, E.: Diffie-Hellman Key Agreement Method. RFC 2631 (June 1999)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2005

Authors and Affiliations

  • Fuwen Liu
    • 1
  • Hartmut Koenig
    • 1
  1. 1.Department of Computer ScienceBrandenburg University of Technology CottbusCottbusGermany

Personalised recommendations