Round-efficient conference key agreement protocols with provable security

Wen-Guey Tzeng, Zhi Jia Tzeng

Research output: Chapter in Book/Report/Conference proceedingConference contribution

42 Scopus citations

Abstract

A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. In this paper we consider the distributed conference key (conference key agreement) protocol. We present two round-efficient conference key agreement protocols, which achieve the optimum in terms of the number of rounds. Our protocols are secure against both passive and active adversaries under the random oracle model. They release no useful information to passive adversaries and achieve fault tolerance against any coalition of malicious participants. We achieve the optimal round by transferring an interactive proof system to a non-interactive version, while preserving its security capability.

Original languageEnglish
Title of host publicationAdvances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
EditorsTatsuaki Okamoto
PublisherSpringer Verlag
Pages614-627
Number of pages14
ISBN (Electronic)3540414045, 9783540414049
DOIs
StatePublished - 1 Jan 2000
Event6th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2000 - Kyoto, Japan
Duration: 3 Dec 20007 Dec 2000

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1976
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2000
CountryJapan
CityKyoto
Period3/12/007/12/00

Fingerprint Dive into the research topics of 'Round-efficient conference key agreement protocols with provable security'. Together they form a unique fingerprint.

Cite this