Security of the center in key distribution schemes

  • Kaoru Kurosawa
  • Koji Okada
  • Keiichi Sakano
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 917)


This paper studies the security of the trusted center in a b-secure t-group key distribution scheme in which the center issues a private information v i , ∈ V to each user i based on the center secret s ∈ S. User i can obtain the common key k ∈ K with t−1 other users from v i so that any dishonest b users cannot learn any key they should not know. First, we show how to distribute the power of the center to m centers so that, even if l−1 centers and b users collaborate, they cannot learn any key that b users should not know. Next, we prove that
$$\log _2 |S| \geqslant \left( {\begin{array}{*{20}c}{b + t} \\t \\\end{array} } \right)\log _2 |K|$$


Private Information Center Scheme Threshold Scheme Protocol Execution Multiparty Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    R.Blom: An Optimal Class of Symmetric Key Generation Systems. Eurocrypt'84, pp.335–338 (1984)Google Scholar
  2. 2.
    C.Blundo, A.De Santis, A.Herzberg, S.Kutten, U.Vaccaro and M.Yung: Perfectly-Secure Key Distribution for Dynamic Conferences. Crypto'92 (1992)Google Scholar
  3. 3.
    A.Beimel and B.Chor: Interaction in Key Distribution Schemes. Crypto'93 (1993)Google Scholar
  4. 4.
    L.Gong and D.J.Wheeler: A matrix Key-Distribution Scheme. Journal of Cryptology, 2, pp. 51–59 (1990)Google Scholar
  5. 5.
    T.Matsumoto and I.Imai: On the Key Predistribution Systems: A Practical Solution to the Key Distribution Problem. Crypto'87, pp.185–193 (1988)Google Scholar
  6. 6.
    E.Okamoto and K.Tanaka: Key Distribution System Based on Identification Information. IEEE J. on Selected Areas in Communications, 7(4), pp. 481–485 (1989)Google Scholar
  7. 7.
    S.Tsujii and J.Chao: A New ID-based Key Sharing Scheme. Crypto'91, pp.288–299 (1991)Google Scholar
  8. 8.
    Y.Desmedt and Y.Frankel: Shared Generation of Authenticators and Signatures. In Advances in Cryptology. Proc. of Crypto'91, pp.11–15 (1991)Google Scholar
  9. 9.
    R.G.Gallager: Information Theory and Reliable Communications. John Wiley & Sons, New York, NY (1968)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1995

Authors and Affiliations

  • Kaoru Kurosawa
    • 1
  • Koji Okada
    • 1
  • Keiichi Sakano
    • 2
  1. 1.Department of Electrical and Electronic Engineering, Faculty of EngineeringTokyo Institute of TechnologyTokyoJapan
  2. 2.Matsushita Electric Industrial Co., LTD.OsakaJapan

Personalised recommendations