期刊文献+

一种容忍入侵的会议密钥分配方案 被引量:9

An intrusion-tolerant conference key distribution scheme
在线阅读 下载PDF
导出
摘要 基于可验证秘密共享技术和知识证明,提出了一种计算上安全的容忍入侵的会议密钥分配方案.该方案具有结构简单、安全性强等特点.分析表明,即使方案中实施密钥分配的服务器组中有部分服务器为入侵者所成功控制,会议的所有诚实用户仍可得到关于会议的正确的密钥;在Diffie HellmenDecisional问题假设下,任何窃听者均无法得到有关会议密钥的任何信息;主动攻击者也无法成功进行任何假冒.由于采用了非交互式的知识证明,所提方案需要的计算开销和通信开销都比较少,效率较高,有着较强的实用性. This paper proposes a computationally secure and fault-tolerant conference key distribution scheme, which only requires the authenticated and encrypted point-to-point channels between each server and each user. By the combined use of knowledge proof and verifiable secret sharing, the scheme has the properties of simple structure and high security. Analysis shows that every honest user of a conference can get a common key after the running of the protocol, even if a minority of the servers malfunction or misbehave. We also show that on the assumption of a Diffie-Hellman decisional problem, a passive adversary gets zero knowledge about the conference key, and the active adversary cannot impersonate someone successfully. Because the knowledge proof method we adopt is non-interactive, both operation and communication overheads are reduced, thus making the schemes very efficient.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2004年第2期260-263,共4页 Journal of Xidian University
基金 国家自然科学基金重大研究计划项目(90204012) 国家高技术研究发展计划(863计划)资助课题(2002AA143021) 教育部优秀青年教师资助计划 教育部科技技术重点研究项目 国家部委预研资助项目
关键词 会议密钥分配 容错 计算安全 可验证秘密共享 知识证明 计算机网络 网络会议 conference key distribution fault-tolerant computationally secure verifiable secret sharing knowledge proof
  • 相关文献

参考文献16

  • 1Bekovits S. How to Broadcast a Secret[A]. Davies D W, Advances in Cryploiogy: Proceedings of EUROCRYPT'91 [C]. Berlin:Spfinger-Veralg, 1992. 536-541.
  • 2Chang C C, Wu T C, Chen C P. The Design of a Conference Key Distribution System[A]. Seberry J, Zheng Y, in Proc Auscrypt'92[C]. Berlin: Springer-Veralg, 1992. 459-466.
  • 3Koyama K. Secure Conference Key Distribution Schemes for Conspiracy Attack[A]. Rainer A Rueppel, EUROCRYPT 1992 [ C].Berlin: Springer-Veralg, 1992, 449-453.
  • 4Burmester M, Desmedt Y. A Secure and Eitlcient Conference Key Distribution System[ A]. Bruce Sehneier, Advaces in Cryptology-Proc Eurocrypt'94[C]. Berlin: Springer-Veralg, 1994. 275-286.
  • 5Koyama K, Ohta K. Identity-based Conference Key Distribution Systems [ A]. C Pomerance, Advances in Cryptoogy: Proceedings of Crypto'87[C]. Berlin: Springer-Verlag, 1998. 175-194.
  • 6Steer D G, Strawczynski L, Difile W, et al. A Secure Audio Teleconference System[A]. Josef Pieprzyk, Proceedings on Advances in Cryptology[C]. Berlin: Spfinger-Verlag, 1990. 520-528.
  • 7Wu T C. Conference Key Distribution System with User Anonymity Based on Algebraic Approach[J]. IEE Proceedings: Computers and Digital Techniques, 1997, 144(2): 145-148.
  • 8Diffie W, HeUman M. New Directions in Cryptography[J]. IEEE Trans on Infi'omation Theory V, 1976, 22(6) : 644-654.
  • 9Long L. Increasing AvAilability and Security of an Authentication Service [J]. IEEE Journal on Selected Areas in Communicaitons,1993, 11(5): 657-662.
  • 10Kein B, Otten M, Beth T.Conference Key Distribution Protocols in Distributed Systems [ A].P G Fatten, Codes and Cyphers,Proceedings of the Fourth IMA Conference on Cryptography and Codlng[C]. Southend-onsea, EsseX: Formara Limlted, 1995. 225-242.

同被引文献84

引证文献9

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部