Perfectly secure key distribution for dynamic conferences

被引:153
|
作者
Blundo, C [1 ]
De Santis, A
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
[2] IBM Corp, TJ Watson Res Ctr, Yorktown Heights, NY 10598 USA
[3] CertCo, New York, NY 10004 USA
关键词
D O I
10.1006/inco.1998.2717
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we analyze perfectly secure key distribution schemes for dynamic conferences. In this setting, any member of a group of t users can compute a common key using only his private initial piece of information and the identities of the other t - 1 users in the group. Keys are secure against coalitions of up to k users; that is, even if k users pool together their pieces they cannot compute anything about a key of any conference comprised of t other users. First we consider a noninteractive model where users compute the common key without any interaction. We prove the tight bound on the size of each user's piece of information of ((k+t-1)(t-1)) times the size of the common key. Then, we consider the model where interaction is allowed in the common key computation phase and show a gap between the models by exhibiting a one-round interactive scheme in which the user's information is only k + t - 1 times the size of the common key. Finally, we present its adaptation to network topologies with neighbourhood constraints and to asymmetric (e.g., client-server) communication models, (C) 1998 Academic Press.
引用
收藏
页码:1 / 23
页数:23
相关论文
共 50 条
  • [1] Unconditionally secure dynamic conference key distribution
    Desmedt, Y
    Viswanathan, V
    [J]. 1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 383 - 383
  • [2] Secure quantum key distribution
    Lo H.-K.
    Curty M.
    Tamaki K.
    [J]. Nature Photonics, 2014, 8 (08) : 595 - 604
  • [3] On key distribution in secure multicasting
    Wu, KP
    Ruan, SJ
    Lai, FP
    Tseng, CK
    [J]. 25TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS - PROCEEDINGS, 2000, : 208 - 212
  • [4] Multi-cast key distribution: scalable, dynamic and provably secure construction
    Kazuki Yoneyama
    Reo Yoshida
    Yuto Kawahara
    Tetsutaro Kobayashi
    Hitoshi Fuji
    Tomohide Yamamoto
    [J]. International Journal of Information Security, 2018, 17 : 513 - 532
  • [5] Multi-cast key distribution: scalable, dynamic and provably secure construction
    Yoneyama, Kazuki
    Yoshida, Reo
    Kawahara, Yuto
    Kobayashi, Tetsutaro
    Fuji, Hitoshi
    Yamamoto, Tomohide
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (05) : 513 - 532
  • [6] A dynamic key distribution scheme using data embedding for secure multimedia multicast
    Song, J
    Poovendran, R
    Trappe, W
    Liu, KJR
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 : 618 - 628
  • [7] Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction
    Yoneyama, Kazuki
    Yoshida, Reo
    Kawahara, Yuto
    Kobayashi, Tetsutaro
    Fuji, Hitoshi
    Yamamoto, Tomohide
    [J]. PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 207 - 226
  • [8] Megabits secure key rate quantum key distribution
    Zhang, Q.
    Takesue, H.
    Honjo, T.
    Wen, K.
    Hirohata, T.
    Suyama, M.
    Takiguchi, Y.
    Kamada, H.
    Tokura, Y.
    Tadanaga, O.
    Nishida, Y.
    Asobe, M.
    Yamamoto, Y.
    [J]. NEW JOURNAL OF PHYSICS, 2009, 11
  • [9] Megabits secure key rate quantum key distribution
    Zhang, Qiang
    Takesue, Hiroki
    Honjo, Toshimori
    Wen, Kai
    Hirohata, Toru
    Suyama, Motohiro
    Takiguchi, Yoshihiro
    Kamada, Hidehiko
    Tokura, Yasuhiro
    Tadanaga, Osamu
    Nishida, Yoshiki
    Asobe, Masaki
    Yamamoto, Yoshihisa
    [J]. 2009 CONFERENCE ON LASERS AND ELECTRO-OPTICS AND QUANTUM ELECTRONICS AND LASER SCIENCE CONFERENCE (CLEO/QELS 2009), VOLS 1-5, 2009, : 2301 - +
  • [10] Management of dynamic key of secure multicast
    Cui, Guohua
    Chen, Li
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2004, 32 (12): : 40 - 42