An efficient probabilistic encryption scheme
Information Processing Letters
Identity-based conference key broadcast schemes with user authentication
Computers and Security
Cryptanalysis of Several Conference Key Distribution Schemes
ASIACRYPT '91 Proceedings of the International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Research note: On the security of Wu and Yeh's conference key distribution system
Computer Communications
Research: Remote scheme for password authentication based on theory of quadratic residues
Computer Communications
A conference key distribution system
IEEE Transactions on Information Theory
Scalable key management for secure multicast communication in the mobile environment
Pervasive and Mobile Computing
A novel hierarchical key management scheme based on quadratic residues
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Hi-index | 0.24 |
A conference key distribution scheme based on the theory of quadratic residues is proposed in this article. In this scheme, conference key is distributed in a broadcast way and no one can impersonate the chairman to distribute the conference key. It can resist the replaying attack by using the time stamp T and authenticate the chairman. The amount of computation is small.