By Topic

Authenticated key distribution and secure broadcast using no conventional encryption: a unified approach based on block codes

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Deng, R.H. ; Inst. of Syst. Sci., Nat. Univ. of Singapore, Singapore ; Li Gong ; Lazar, A.A. ; Weiguo Wang

To eliminate the use of conventional encryption and to improve protocol efficiency, one-way hash function based authenticated key distribution protocols have appeared in the literature following two distinct approaches: the first approach employs one-way hash function and bit-wise XOR operation; while the second approach makes use of one-way hash function and polynomial interpolation. In this paper, we present a new technique for constructing one-way hash function based protocols for authenticated key distribution. The technique makes use of systematic linear block codes in error-control coding theory, results in more efficient protocols compared with their counterparts in the literature, and in effect, unifies the above two approaches in designing such protocols. As a by product, a secure broadcast protocol is also given which is capable of distributing a data message of any size in one broadcast protocol message

Published in:

Global Telecommunications Conference, 1995. GLOBECOM '95., IEEE  (Volume:2 )

Date of Conference:

14-16 Nov 1995