Identity based conference key distribution scheme from parings

被引:0
|
作者
Li, SQ [1 ]
Chen, KF [1 ]
Li, XX [1 ]
Lu, RX [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A conference key distribution system can provide a session key of a conference with more than three participants via network. In this paper,we propose an ID-based conference key distribution scheme from pairings. The proposed scheme provides user anonymity. At the same time, we also show that the proposed scheme is secure against replaying attacks and conspiratorial impersonation attacks.
引用
收藏
页码:845 / 852
页数:8
相关论文
共 50 条
  • [41] Public key based key distribution scheme for wireless sensor networks
    Huang, Jie
    Huang, Bei
    Tongxin Xuebao/Journal on Communications, 2011, 32 (10): : 52 - 58
  • [42] A Scalable Conference Key Management Scheme
    Xu Yanyan
    Xu Zhengquan
    Li Maoquan
    2006 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, 2006,
  • [43] A Novel Key Distribution Scheme Based on Transmission Delays
    Huang, Jie
    Wang, Xiaowen
    Wang, Wei
    Duan, Zhenyu
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [44] Identity-based fault-tolerant conference key agreement
    Yi, X
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (03) : 170 - 178
  • [45] Conference key agreement based on continuous-variable quantum key distribution
    Zhao, Wei
    Shi, Ronghua
    Feng, Yanyan
    Ruan, Xinchao
    LASER PHYSICS LETTERS, 2021, 18 (07)
  • [46] Anonymous Identity-Based Key Scheme in Application of Privacy Protection
    Shen, Changjiang
    Yang, Lan
    Zhou, Chuansheng
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON EDUCATION, SPORTS, ARTS AND MANAGEMENT ENGINEERING (ICESAME 2017), 2017, 123 : 1529 - 1535
  • [47] A Forward Secure Identity Based Encryption Scheme with Master Key Update
    Yang, Peng
    Matsuura, Kanta
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 336 - 341
  • [48] A key agreement scheme for identity authentication based on multiple security factors
    Wang, Ying, 1600, Transport and Telecommunication Institute, Lomonosova street 1, Riga, LV-1019, Latvia (18):
  • [49] IKM -- An identity based key management scheme for heterogeneous sensor networks
    Boujelben M.
    Youssef H.
    Mzid R.
    Abid M.
    Journal of Communications, 2011, 6 (02): : 185 - 197
  • [50] Identity Based Group Key Management Scheme for Ad Hoc Groups
    Liu Zhiyuan
    Li Li
    Cheng Xi-cai
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 425 - 429