New protocols for third-party-based authentication and secure broadcast

  • Authors:
  • Li Gong

  • Affiliations:
  • SRI International, Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, California

  • Venue:
  • CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
  • Year:
  • 1994

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper gives Needham-Schroeder style third-party-based authentication and key-distribution protocols that do not use conventional cryptosystems such as DES. The new protocols use polynomial interpolation and secure keyed one-way hash functions, and are efficient compared with protocols using conventional cryptosystems. The same techniques are generalized to develop protocols for secure broadcast and for secure communication.