Identity based conference key distribution scheme from parings

被引:0
|
作者
Li, SQ [1 ]
Chen, KF [1 ]
Li, XX [1 ]
Lu, RX [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A conference key distribution system can provide a session key of a conference with more than three participants via network. In this paper,we propose an ID-based conference key distribution scheme from pairings. The proposed scheme provides user anonymity. At the same time, we also show that the proposed scheme is secure against replaying attacks and conspiratorial impersonation attacks.
引用
收藏
页码:845 / 852
页数:8
相关论文
共 50 条
  • [1] A new identity-based conference key distribution scheme
    Xu, SB
    van Tilborg, H
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 269 - 269
  • [2] Scheme of conference key distribution based upon user's identity
    Hsi An Chiao Tung Ta Hsueh, 8 (105-108, 119):
  • [3] Identity-based conference key distribution scheme using sealed lock
    Cai, Yongquan
    Li, Xiuying
    7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 282 - +
  • [4] An identity-based fault-tolerant conference key distribution scheme
    Yang Zongkai
    Xie Haitao
    Cheng Wenqing
    Tan Yunmeng
    SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 389 - +
  • [5] An improved identity-based fault-tolerant conference key distribution scheme
    Cai, Yongquan
    Li, Xiuying
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 345 - +
  • [6] Identity Based Group Key Distribution Scheme
    Wang H.
    Qin W.
    Liu Q.
    Yu C.
    Shen Z.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (10): : 2203 - 2217
  • [7] Identity-based conference key distribution systms
    Koyama, Kenji, 1600, (21):
  • [8] IDENTITY-BASED CONFERENCE KEY DISTRIBUTION-SYSTEMS
    KOYAMA, K
    OHTA, K
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 293 : 175 - 184
  • [9] IDENTITY-BASED CONFERENCE KEY DISTRIBUTION-SYSTEM
    KOYAMA, K
    ELECTRONICS LETTERS, 1987, 23 (10) : 495 - 496
  • [10] A conference key distribution scheme based on the theory of quadratic residues
    Tan, KJ
    Zhu, HW
    COMPUTER COMMUNICATIONS, 1999, 22 (08) : 735 - 738