On Classifying Conference Key Distribution Protocols

  • Shahrokh Saeednia
  • Rei Safavi-Naini
  • Willy Susilo
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2119)


In this paper, we examine a classification of conference key distribution protocols proposed in [4] and show that no known protocol satisfies the security requirements in class 4, the highest security class of this classification. We show two new attacks on protocols that were believed to belong to the highest security class and show that both protocols in fact belong to class 3. This motivates us to propose a refinement of this classification to allow separating protocols with different security properties while maintaining the classification framework.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    M. Burmester and Y. Desmedt. A secure and efficient conference key distribution system. Advances in Cryptology-Eurocrypt’ 94, Lecture Notes in Computer Science 950, pages 275–286, 1994.CrossRefGoogle Scholar
  2. 2.
    M. Burmester, Y. Desmedt, T. Itoh, K. Sakurai, H. Shizuya, and M. Yung. A progress report on subliminal-free channels. Workshop on Information Hiding, 1996.Google Scholar
  3. 3.
    W. Diffie and M. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, vol. 22, pages 644–654, 1976.zbMATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    S. Saeednia and R. Safavi-Naini. Efficient Identity-Based Conference Key Distribution Protocols. Information Security and Privacy, ACISP’ 98, Lecture Notes in Computer Science 1438, pages 320–331, 1998.CrossRefGoogle Scholar
  5. 5.
    G. J. Simmons. The subliminal channel and digital signatures. Advances in Cryptology-Eurocrypt’ 84, Lecture Notes in Computer Science 209, pages 364–178, 1984.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Shahrokh Saeednia
    • 1
  • Rei Safavi-Naini
    • 2
  • Willy Susilo
    • 2
  1. 1.Département d’InformatiqueUniversite Libré de BruxellesBruxellesBelgium
  2. 2.Centre for Computer Security Research School of Information Technology and Computer ScienceUniversity of WollongongWollongongAustralia

Personalised recommendations