Security of improved identity-based conference key distribution systems

  • Authors:
  • K. Koyama;K. Ohta

  • Affiliations:
  • Basic Research Laboratories, Tokyo, Japan;Basic Research Laboratories, Tokyo, Japan

  • Venue:
  • Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
  • Year:
  • 1988

Quantified Score

Hi-index 0.00

Visualization

Abstract

At Crypto-87 conference, we proposed identity-based key distribution systems for generating a common secret conference key for two or more users. Protocols were shown for three configurations: a ring, a complete graph, and a star. Yacobi has made an impersonation attack on the protocols for the complete graph and star networks. This paper proposes improved identity-based key distribution protocols to counter his attack.