By Topic

An efficient and robust conference key distribution protocol

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Yuan-bo Guo ; Sch. of Comput., Xidian Univ., Shaanxi, China ; Jian-feng Ma

A computationally secure and robust conference key distribution scheme is presented, which requires only the authenticated and encrypted point-to-point channels between each server and each user. By using it, every honest user of a conference can get a common key after running of the protocol, even if some minority of the servers malfunction or misbehave. Analysis shows that a passive adversary gets zero knowledge about the conference key, and the active adversary cannot impersonate successfully. Because this scheme is noninteractive, both operation and communication overhead are reduced, this make it very efficient.

Published in:

Computer Networks and Mobile Computing, 2003. ICCNMC 2003. 2003 International Conference on

Date of Conference:

20-23 Oct. 2003