Algorithmica
Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Security of improved identity-based conference key distribution systems
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
CRYPTO '89 Proceedings on Advances in cryptology
A Non-interactive Public-Key Distribution System
Designs, Codes and Cryptography
A Secure Fault-Tolerant Conference-Key Agreement Protocol
IEEE Transactions on Computers
A Protocol for Establishing Secure Communication Channels in a Large Network
IEEE Transactions on Knowledge and Data Engineering
Conference Key Agreement from Secret Sharing
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
A Modular Approach to Key Distribution
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Round-Efficient Conference Key Agreement Protocols with Provable Security
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
How to Utilize the Randomness of Zero-Knowledge Proofs
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Computer Standards & Interfaces
Improved conference key distribution protocol based on a symmetric balanced incomplete block design
ACM SIGOPS Operating Systems Review
A secure and scalable group key exchange system
Information Processing Letters
A secure and scalable Group Key Exchange system
Information Processing Letters
Non-interactive public-key cryptography
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A simple and efficient conference scheme for mobile communications
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Conference key distribution schemes for portable communication systems
Computer Communications
Hi-index | 0.01 |
This paper proposes identity-based key distribution systems for generating a common secret conference key for two or more users. Users are connected in a ring, a complete graph, or a star network. Messages among users are authenticated using each user's identification information. The security of the proposed systems is based on the difficulty of both factoring large numbers and computing discrete logarithms over large finite fields.