One way hash functions and DES
CRYPTO '89 Proceedings on Advances in cryptology
Information Processing Letters
Identity-based Conference Key Distribution Systems
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
IEEE Transactions on Consumer Electronics
Conference key distribution schemes for secure digital mobile communications
IEEE Journal on Selected Areas in Communications
Efficient user authentication and key agreement in ubiquitous computing
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Hi-index | 0.00 |
By using wireless communications, conferees can join a teleconference at any time and any place. In order to hold a secure teleconference, they must share a conference key before holding the conference. Up to date, public key cryptosystems are used in all proposed conference key distribution schemes for protecting the privacy of conferees' locations during the conference. The computation cost and communication cost of these schemes is still high. In this paper, we propose a simple and efficient conference scheme for mobile communications. The main merits of our scheme include: (1) conferees can share a common conference key to hold a secure teleconference over a public channel; (2) the location of a particular conferee is protected to prevent a tracking attack; (3) it allows a user to join or quit a mobile teleconference dynamically; (4) only secure one-way hash functions and symmetric key cryptosystems are used, and the computation and communication cost is very low; (5) there needs no passwords or shared keys table in the network center.