Conference Key Supervision in a Level-Based Hierarchy
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, we propose a new conference key distribution scheme and the supervision of a conference when users are in a level-based hierarchy. In a conference key distribution system, one message is transmitted to the participants from a chairman, a legitimate member can decrypt it and reveal the common session key. The proposed scheme can be implemented without using any tamper-proof hardware. For users in a level-based hierarchy, by applying the key distribution scheme, the higher priority users can derive the conference key and supervise the lower level users' communications. Further, the users in the same level who are not members of the conference or in lower levels can not expose the conference key. To break the common session key, a malicious user has to suffer from the difficulty of factorization and discrete logarithm problems.
- 社団法人電子情報通信学会の論文
- 1998-10-25
著者
-
Wang C‐t
National Chin‐yi Inst. Of Technol. Taichung Twn
-
WANG Ching-Te
Institute of Computer Science and Information Engineering, National Chung Cheng University
-
CHANG Chin-Chen
Institute of Computer Science and Information Engineering, National Chung Cheng University
-
LIN Chu-Hsing
Department of Computer and Information Sciences, Tunghai University
-
Chang C‐c
National Chung Cheng Univ. Chiayi Twn
-
Lin Chu-hsing
The Author Is With The Department Of Computer And Information Sciences Tunghai University
-
Chang Chin-chen
Institute Of Computer Science And Information Engineering National Chung Cheng University
関連論文
- Generalization of Threshold Signature and Authenticated Encryption for Group Communications
- Conference Key Supervision in a Level-Based Hierarchy
- Two Efficient Server-Aided RSA Secret Computation Protocols Against Active Attacks
- An Efficient Dynamic Threshold Scheme
- A Robust Watermarking System Based on the Properties of Low Frequency in Perceptual Audio Coding(Multimedia Environment Technology)
- A Dynamic Secret Sharing Scheme Based on the Factoring and Diffie-Hellman Problems
- A Survey of Key-to-Key User Hierarchic Representation Mechanisms