Skip to main content

Efficient identity-based conference key distribution protocols

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1438))

Included in the following conference series:

Abstract

In this paper we study security properties of conference key distribution protocols and give a hierarchy of four security classes. We show various problems with the Burmester-Desmedt conference key distribution protocol and show that the authenticated version of the protocol belongs to class 2. We give a modification of the protocol that makes it identity-based. Another modification provides us a class 4 protocol that is secure against insiders' attacks. This protocol is most efficient compared to known authenticated conference key distribution protocols. Finally we propose a particular key confirmation protocol that may be combined with almost all conference key distribution protocols to achieve the highest security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M.Yung, “Perfectly secure key distribution for dynamic conferences”, Proceedings of Crypto '92, LNCS, vol. 740, Springer-Verlag, 1993, pp. 471–487

    Google Scholar 

  2. C. Boyd, “On key agreement and conference key agreement”, Proceedings of ACISP '97, LNCS, vol. 1270, Springer-Verlag, 1997, pp. 294–302

    Google Scholar 

  3. M. Burmester and Y. Desmedt, “A secure and efficient conference key distribution system”, Proceedings of Eurocrypt '94, LNCS, vol. 950, Springer-Verlag, 1994, pp. 275–286

    Google Scholar 

  4. W. Diffie and M. Hellman, “New directions in cryptography”, IEEE Trans. Inform. Theory, vol. 22, 1976, pp. 644–654

    Article  MATH  MathSciNet  Google Scholar 

  5. M.Fischer and R. Wright, “Multiparty secret key exchange using a random deal of cards”, Proceedings of Crypto '91, LNCS, vol. 576, Springer-Verlag, 1992, pp. 141–155

    Google Scholar 

  6. M. Just and S. Vaudenay, “Authenticated multi-party key agreement”, Proceedings of ASIA CRYPT '96, LNCS, vol. 1163, Springer-Verlag, 1996, pp. 36–49

    Google Scholar 

  7. K. Koyama and K. Ohta, “Identity-based conference key distribution systems”, Proceedings of Crypto '87, LNCS, vol. 293, Springer-Verlag, 1988, pp. 175–184

    Google Scholar 

  8. S. Saeednia and R. Safavi-Naini, ”A new identity-based key exchange protocol minimizing computation and communication”, Proceedings of IS W '97, LNCS, to appear

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Colin Boyd Ed Dawson

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saeednia, S., Safavi-Naini, R. (1998). Efficient identity-based conference key distribution protocols. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053744

Download citation

  • DOI: https://doi.org/10.1007/BFb0053744

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64732-4

  • Online ISBN: 978-3-540-69101-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics