Conference key agreement protocol with non-interactive fault-tolerance over broadcast network

  • Authors:
  • Jiin-Chiou Cheng;Chi-Sung Laih

  • Affiliations:
  • Department of Electrical Engineering, National Cheng Kung University, Cryptography and Network Security Lab., No.1, University Road, 701, Tainan City, Taiwan, R.O.C.;Department of Electrical Engineering, National Cheng Kung University, Cryptography and Network Security Lab., No.1, University Road, 701, Tainan City, Taiwan, R.O.C.

  • Venue:
  • International Journal of Information Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Most conventional conference key agreement protocols have not been concerned with a practical situation. There may exist some malicious conferees who attempt to block conference initiation for some purposes, e.g. commercial, political or military benefit. Instances where conference must be launched immediately due to emergency, efficient detection of malicious behavior would be needed. Recently, Tzeng (IEEE Trans. Comput. 51(4):373–379, 2002) proposed a fault-tolerant conference key agreement protocol to address the issue where a conference key can be established among conferees even though malicious conferees exist. However, his protocol might be complex and inefficient during fault-detection. In the case where a malicious conferee exists and a fault-tolerant mechanism is launched, complicated interactions between conferees will be required. In this paper, we introduce a novel strategy, where any malicious conferee may be identified and removed from the conferee list without any interaction. With such a non-interactive fault-tolerance, conferences could be established and started efficiently. A complete example of our protocol will be given to describe the fascinating fault-tolerance. We analyse the security of our protocol regarding four aspects, i.e. correctness, fault-tolerance, active attack and passive attack. The comparisons of performance between our protocol and that of Tzeng are also shown. As a whole, the advantage of our protocol is superior to that of Tzeng under the situation where malicious conferees exist.