Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
New protocols for third-party-based authentication and secure broadcast
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Perfect Secret Sharing Schemes on Five Participants
Designs, Codes and Cryptography
A Construction for Multisecret Threshold Schemes
Designs, Codes and Cryptography
A Non-interactive Public-Key Distribution System
Designs, Codes and Cryptography
Secure multicast in wireless networks of mobile hosts: protocols and issues
Mobile Networks and Applications
A Secure Fault-Tolerant Conference-Key Agreement Protocol
IEEE Transactions on Computers
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
A New ID-Based Key Sharing System
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Interaction in Key Distribution Schemes (Extended Abstract)
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Some Bounds and a Construction for Secure Broadcast Encryption
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Round-Efficient Conference Key Agreement Protocols with Provable Security
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Unconditionally Secure Anonymous Encryption and Group Authentication
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
ISW '99 Proceedings of the Second International Workshop on Information Security
ISW '00 Proceedings of the Third International Workshop on Information Security
ISC '01 Proceedings of the 4th International Conference on Information Security
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A ramp model for distributed key distribution schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Generation of key predistribution schemes using secret sharing schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
An Optimal Multisecret Threshold Scheme Construction
Designs, Codes and Cryptography
Self-organised group key management for ad hoc networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
A unified model for unconditionally secure key distribution
Journal of Computer Security
ID-based cryptography using symmetric primitives
Designs, Codes and Cryptography
Non-interactive conference key distribution and its applications
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Group-Based Key Management for Multicast of Ad Hoc Sensor Network
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
An ID-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
Key Predistribution Schemes for Sensor Networks Using Finite Plane Geometry
IEICE - Transactions on Information and Systems
MPISec I/O: Providing Data Confidentiality in MPI-I/O
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
A graph theoretic approach for optimizing key pre-distribution in wireless sensor networks
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Non-interactive public-key cryptography
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Unconditionally secure homomorphic pre-distributed commitments
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
A dynamic group key distribution scheme with flexible user join
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
A group key distribution scheme with decentralised user join
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
A two-party protocol with trusted initializer for computing the inner product
WISA'10 Proceedings of the 11th international conference on Information security applications
Universally composable private proximity testing
ProvSec'11 Proceedings of the 5th international conference on Provable security
An efficient ID-Based bilinear key predistribution scheme for distributed sensor networks
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
SKiMPy: a simple key management protocol for MANETs in emergency and rescue operations
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Research note: Three ID-based information security functions
Computer Communications
Identity-based non-interactive key distribution with forward security
Designs, Codes and Cryptography
Hi-index | 0.00 |
To utilize the common-key encryption for the efficient message protection in a large communication network, it is desired to settle the problem of how to distribute the common keys. This paper describes a practical solution called the key predistribution system (KPS, for short), which has been proposed by the present authors. On request, the KPS quickly brings a common key to an arbitrary group of entities in a network. Using the KPS, it is quite easy to construct an enciphered one-way communication system, as well as an enciphered two-way (interactive) communication system. For example, even in a very large public network, the KPS can be applied to realize a practical enciphered electronic mailing service directed to individuals. This paper presents secure and efficient realization schemes for the KPS. This paper also discusses the security issues and the variety of applications of them.