The subliminal channel and digital signatures
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Efficient Identity-Based Conference Key Distribution Protocols
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
A Progress Report on Subliminal-Free Channels
Proceedings of the First International Workshop on Information Hiding
Hi-index | 0.00 |
In this paper, we examine a classification of conference key distribution protocols proposed in [4] and show that no known protocol satisfies the security requirements in class 4, the highest security class of this classification. We show two new attacks on protocols that were believed to belong to the highest security class and show that both protocols in fact belong to class 3. This motivates us to propose a refinement of this classification to allow separating protocols with different security properties while maintaining the classification framework.