Abstract
Many emerging group oriented and collaborative applications such as audio/video conferences use the peer-to-peer paradigm. Confidentiality is an often demanded feature for such applications, e.g. in business meetings, to provide group privacy. To assure confidentiality in a meeting the partners have to agree upon a common secret key for encrypting their communication. This requires efficient distributed group key exchange protocols. We present the principle of the key distribution protocol TKD which achieves a lower key refreshment delay compared to existing key exchange protocols.
Chapter PDF
Similar content being viewed by others
Keywords
- Communication Round
- Collaborative Application
- Token Holder
- Distribute System Security Symposium
- Closed Meeting
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Kim, Y., Perrig, A., Tsudik, G.: Tree-based Group Key Agreement. ACM Transactions on Information Systems Security (TISSEC) 7(1), 60–96 (2004)
Rodeh, O., Birman, K.P., Dolev, D.: Optimized Group Rekey for Group Communication Systems. In: Network and Distributed System Security Symposium (NDSS 2000), pp. 39–48 (2000)
The BRAVIS video conference system, http://www.bravis.tu-cottbus.de
Kaufman, C.: Internet Key Exchange (IKEv2) Protocol, draft-ietf-ipsec-ikev2-17.txt (September 2004)
Rescorla, E.: Diffie-Hellman Key Agreement Method. RFC 2631 (June 1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 IFIP International Federation for Information Processing
About this paper
Cite this paper
Liu, F., Koenig, H. (2005). Efficient Key Distribution for Closed Meetings in the Internet. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds) Communications and Multimedia Security. CMS 2005. Lecture Notes in Computer Science, vol 3677. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552055_30
Download citation
DOI: https://doi.org/10.1007/11552055_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28791-9
Online ISBN: 978-3-540-31978-8
eBook Packages: Computer ScienceComputer Science (R0)