Identity based conference key distribution scheme from parings

被引:0
|
作者
Li, SQ [1 ]
Chen, KF [1 ]
Li, XX [1 ]
Lu, RX [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A conference key distribution system can provide a session key of a conference with more than three participants via network. In this paper,we propose an ID-based conference key distribution scheme from pairings. The proposed scheme provides user anonymity. At the same time, we also show that the proposed scheme is secure against replaying attacks and conspiratorial impersonation attacks.
引用
收藏
页码:845 / 852
页数:8
相关论文
共 50 条
  • [21] Evaluation of Key Management Scheme Based on Identity
    Ramesh, Ch.
    Rao, K. Venu Gopal
    Vasumathi, D.
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 545 - 550
  • [22] Identity - Based Multiple Key Agreement Scheme
    Dehkordi, Massoud Hadian
    Alimoradi, Reza
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (12): : 2392 - 2402
  • [23] A conference key distribution scheme in a totally-ordered hierarchy
    Hwang, MS
    Tzeng, WG
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR ENHANCED INTERNET SERVICES, 2003, 2662 : 757 - 761
  • [24] Anonymous Conference Key Distribution Scheme with Perfect Forward Security
    Li Fang
    Gao Huanzhi
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 330 - +
  • [25] The Subset Keys and Identity Tickets (SKIT) Key Distribution Scheme
    Ramkumar, Mahalingam
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) : 39 - 51
  • [26] A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme
    Cai, Yang
    Xu, Qiuliang
    Zheng, Zhihua
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 636 - 640
  • [27] IDENTITY-BASED CONFERENCE KEY BROADCAST SYSTEMS
    HWANG, T
    CHEN, JL
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (01): : 57 - 60
  • [28] Authenticated conference key distribution scheme and secure broadcast scheme with the capability to correct errors
    Xu, Shengbo
    Wang, Xinmei
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 1998, 26 (01): : 102 - 104
  • [29] Attacks to Xu-Tilborg's conference key distribution scheme
    Jung, BE
    Paeng, SH
    Kim, DY
    IEEE COMMUNICATIONS LETTERS, 2004, 8 (07) : 446 - 448
  • [30] THE DEVELOPMENT AND TESTING OF THE IDENTITY-BASED CONFERENCE KEY DISTRIBUTION-SYSTEM FOR THE RHODOS DISTRIBUTED SYSTEM
    WANG, M
    GOSCINSKI, A
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 209 - 228