Scalable, secure, mobile computing with location information
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Communications of the ACM
Identity-based Conference Key Distribution Systems
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
A modification of the RSA public-key encryption procedure (Corresp.)
IEEE Transactions on Information Theory
A conference key distribution system
IEEE Transactions on Information Theory
Portable digital radio communications-an approach to tetherless access
IEEE Communications Magazine
Privacy and authentication on a portable communications system
IEEE Journal on Selected Areas in Communications
Conference key distribution schemes for secure digital mobile communications
IEEE Journal on Selected Areas in Communications
Hi-index | 0.24 |
In the future, the portable communication system will be more and more popular. In this paper, we propose a new scheme that, with the help of this convenient system, can be used to hold conferences with only one common conference key while maintaining a high security level. Our new scheme can solve the problems of the low computation power of portable telephones and the heavy traffic between several participators. Our scheme does not only reduce the computation cost of portable telephones, but also alleviate communication traffic cost. Certainly, our scheme achieves two basic requirements: privacy and authentication.