Unconditionally secure dynamic conference key distribution

被引:4
|
作者
Desmedt, Y [1 ]
Viswanathan, V [1 ]
机构
[1] Univ Wisconsin, EE&CS, Milwaukee, WI 53201 USA
关键词
D O I
10.1109/ISIT.1998.708988
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We present a non-interactive conference key distrubtion protocol in which all n users receive initial secrets from a trusted server. When a subset of the n users want to communicate privately, each of the users involved can without interaction compute the common key. We prove that the length of the initial secrets we use, are optimal.
引用
收藏
页码:383 / 383
页数:1
相关论文
共 50 条
  • [1] Unconditionally Secure Conference Key Distribution: Security Definitions and Their Relations
    Safavi-Naini, Reihaneh
    Jiang, Shaoquan
    [J]. 2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 1215 - 1220
  • [2] UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS
    Safavi-Naini, Reihaneh
    Jiang, Shaoquan
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (06) : 1369 - 1393
  • [3] A unified model for unconditionally secure key distribution
    Cimato, Stelvio
    Cresti, Antonella
    D'Arco, Paolo
    [J]. JOURNAL OF COMPUTER SECURITY, 2006, 14 (01) : 45 - 64
  • [4] Unconditionally secure key distribution in higher dimensions by depolarization
    Chau, HF
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (04) : 1451 - 1468
  • [5] On unconditionally secure robust distributed Key Distribution Centers
    D'Arco, P
    Stinson, DR
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 346 - 363
  • [6] Quantum Repeater Node Demonstrating Unconditionally Secure Key Distribution
    Langenfeld, S.
    Thomas, P.
    Morin, O.
    Rempe, G.
    [J]. PHYSICAL REVIEW LETTERS, 2021, 126 (23)
  • [7] Unconditionally secure key distribution based on two nonorthogonal states
    Tamaki, K
    Koashi, M
    Imoto, N
    [J]. PHYSICAL REVIEW LETTERS, 2003, 90 (16)
  • [8] On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption
    Stinson D.R.
    [J]. Designs, Codes and Cryptography, 1997, 12 (3) : 215 - 243
  • [9] Unconditionally secure quantum key distribution with relatively strong signal pulse
    Tamaki, Kiyoshi
    [J]. PHYSICAL REVIEW A, 2008, 77 (03):
  • [10] Unconditionally secure key assignment schemes
    De Santis, A
    Ferrara, AL
    Masucci, B
    [J]. DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 234 - 252