Abstract
Key distribution is a major cryptographic component for secure communication. To ensure privacy data must be encrypted with keys which are distributed securely. The keys must be properly authenticated. Most of the research on key distribution has focussed on two-party systems although there is some notable work on conference systems (with more than two parties). However the dynamic aspect of such systems has been neglected. In this paper we address this issue and consider a scenario appropriate for internet applications. We show how a conference system can be extended efficiently to enable new participants to join, in such a way that all earlier communication within the conference is protected. We also consider the case when participants leave a conference. Our approach is general and can be used with any conference system. The security of our dynamic extension is essentially the same as that of the conference system. Finally we discuss several threats to dynamic conferencing.
Chapter PDF
Similar content being viewed by others
References
Bellare, M. and Rogaway, P. (1994) Entity authentication and key distribution, in Advances in Cryptology, Crypto ’93, Lecture Notes in Computer Science773 (ed. D.R. Stinson), Springer-Verlag, 232–249.
Bengio, S., Brassard, G., Desmedt, Y.G., Goutier C. and Quisquater, J.-J. (1991) Secure implementations of identification systems. Journal of Cryptology, 4(3), 175–183.
Bird, R., Gopal, I., Herzberg, A., Jansen, P., Kutten, S., Molva, S.R. and Yung, M. (1992) Systematic design of two-party authentication protocols, in Advances in Cryptology, Crypto ’91, Lecture Notes in Computer Science576 (ed. J. Feigenbaum) Springer-Verlag, 44–61.
Burmester, M. (1994) On the Risk of Opening Distributed Keysn in Advances in Cryptology, Crypto ’94, Lecture Notes in Computer Science 839 (ed. Y. Desmedt) Springer-Verlag, 308–317.
Burmester, M. and Desmedt, Y. (1995) A Secure and Efficient Conference Key Distribution System, in Advances in Cryptology, Eurocrypt ’94, Lecture Notes in Computer Science950 (ed. A. De Santis) Springer-Verlag, 275–286.
Burmester, M. and Desmedt, Y. (1996) Efficient and Secure Conference Key Distribution. Proceedings of the International Workshop on Security Protocols, Lecture Notes in Computer Science 1189 (ed. M. Lomas) Cambridge, 10–12 April 1996, 119–129.
Chrissikopoulos, V. and Peppes, D. (1995) A Practical Conference Key Distribution System, in Information Security — the Next Decade, Proc. IFIP/SEC95 (eds. J. Eloff and S. Solms) Chapman and Hall, 168–175.
Denning, D.E.R. (1982) Cryptography and Data Security. Addison-Wesley, Reading, MA.
Diffie, W. and Hellman, M.E. (1976) New directions in cryptography. IEEE Trans. Inform. Theory, IT-22(6), 644–654.
Diffie, W., van Oorschot, P.C. and Wiener M.J. (1992) Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2,107–125.
Justin, M. and Vaudeney, S. (1996) Authenticated Multi-party Key Agreement, in Advances in Cryptology, Asiacrypt ’96, Lecture Notes in Computer Science 1163 (eds. K. Kim and T. Matsumoto), Springer-Verlag, 36–49.
Ingemarsson, I., Tang, D.T. and Wong, C.K. (1982) A conference key distribution system. IEEE Trans. Inform. Theory, 28(5), 714–720.
Koyama, K. and Ohta, K. (1988) Identity-based conference key distribution systems, in Advances in Cryptology, Proc. of Crypto ’87, Lecture Notes in Computer Science 293 (ed. C. Pomerance) Springer-Verlag, 175–185.
Kohl, J., Newmann, B.C. and Ts’o, T. (1994) The evolution of the Kerberos Authentication System. Distributed Open Systems, IEEE Computer Society Press, 78–94.
Matsumoto, T. , Takashima Y. and Imai, H. (1986) On seeking smart public-key distribution systems. Transactions of the IECE, 69, 99–106. 106.
Needham, R.M. and Schroeder, M.D. (1978) Using Encryption for Authentication in Large Networks of Computers. Commun. ACM, 21, 993–999.
Okamoto, E. (1988) Key distribution systems based on identification information, in Advances in Cryptology, Proc. of Crypto ’87, Lecture Notes in Computer Science293 (ed. C. Pomerance) Springer-Verlag, 194–20.
Oppliger, R. and Albanese, A. (1996) Distributed registratiop and key Distribution (DiRK), in Information Systems Security, Facing the information Society of the 21st century, IFIP SEC ’96. (eds. S.K. Katsikas, D. Gritzalis) Chapman & Hall, 199–208.
Rueppel, R.A. and van Oorschot, P.C. (1994) Modern key agreement techniques. Computer Communications, 17, 458–465.
Yacobi, Y. and Shmuely Z. (1990) On key distribution systems, in Advances in Cryptology, Crypto ’89, Proceedings, Lecture Notes in Computer Science435 (ed. G. Brassard), Springer-Verlag, 344–355.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 IFIP
About this chapter
Cite this chapter
Alexandris, N., Burmester, M., Chrissikopoulos, V. (1997). Secure group communication: a dynamic approach. In: Katsikas, S. (eds) Communications and Multimedia Security. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35256-5_24
Download citation
DOI: https://doi.org/10.1007/978-0-387-35256-5_24
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2918-3
Online ISBN: 978-0-387-35256-5
eBook Packages: Springer Book Archive