Abstract
At the Eurocrypt’88 meeting, we proposed three identity-based conference key distribution schemes. At the Asiacrypt’91 meeting, Shimbo and Kawamura presented a conspiracy attacking method which worked against our schemes to disclose a user’s secret information. This paper proposes an improved identity-based conference key distribution scheme to counter this attack.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
D. Beaver: “Foundations of Secure Interactive Computing”, Proc. of CRYPTO’91, pp.9-1–9-7 (1991).
T. Chikazawa and T. Inoue: “A new key sharing system for global telecommunications”, Proc. of GLOBCOM’90, pp.1069–1072 (1990).
W. Fumy and M. Munzert: “A modular approach to key distribution”, Proc. of CRYPTO’90, pp.274–283 (1990).
A. Fiat and A. Shamir: “How to prove yourself: Practical solutions to identification and signature problems”, Proc. of CRYPTO’86, pp.186–194 (1986).
U. Feige, A. Fiat and A. Shamir: “Zero knowledge proofs of identity”, Proc. of STOC, pp.210–217 (1987).
L.C. Guillou and J. J. Quisquarter: “A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory”, Proc. of Eurocrypt’88, pp.123–128 (1990).
I. Ingemarson, D.T. Tang and C.K. Wong: “A conference key distribution system”, IEEE Trans. on Information Theory, Vol. IT-28, pp.714–720, (1982).
K. Koyama and K. Ohta: “Security of Improved Identity-based Conference Key Distribution Systems”, Proc. of Eurocrypt’88, pp.11–19 (1989).
C.S. Laih, J.Y. Lee and L. Harn: “A new threshold scheme and its application in designing the conference key distribution cryptosystem”, Information Processing Letters, Vol.32, No.3, pp.95–99 (1989).
K.S. McCurley: “A key distribution system equivalent to factoring”, J. of Cryptology, Vol.1, No. 2, pp.95–106, (1988).
S. Micali and P. Rogaway: “Secure computation”, Proc. of CRYPTO’91, p9–8 (1991).
E. Okamoto: “Proposal for identity-based key distribution systems”, Electronics Letters Vol.22 pp.1283–1284 (1986).
K. Ohta and T. Okamoto: “A modification of the Fiat-Shamir scheme”, Proc. of CRYPTO’88, pp.232–243 (1988).
G. J. Simmons: “A ‘weak’ privacy protocol using the RSA crypto algorithm”, Cryptologia 7, 2, pp.180–182 (1983).
Z. Shmuely: “Composite Diffie-Hellman public-key generating systems are hard to break”, TR. NO. 356, Computer Science Dept. Technion, IIT, Feb. (1985).
A. Simbo and S. Kawamura “Cryptanalysis of several conference key distribution schemes”, Proc. of Asiacrypt’91, pp.155–160 (1991).
Y. Yacobi: “A key distribution “paradox””, Proc. of CRYPTO’90, pp.268–273 (1990).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1993 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Koyama, K. (1993). Secure Conference Key Distribution Schemes for Conspiracy Attack. In: Rueppel, R.A. (eds) Advances in Cryptology — EUROCRYPT’ 92. EUROCRYPT 1992. Lecture Notes in Computer Science, vol 658. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47555-9_37
Download citation
DOI: https://doi.org/10.1007/3-540-47555-9_37
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-56413-3
Online ISBN: 978-3-540-47555-2
eBook Packages: Springer Book Archive