Unconditionally Secure Conference Key Distribution: Security Definitions and Their Relations

被引:0
|
作者
Safavi-Naini, Reihaneh [1 ]
Jiang, Shaoquan [1 ]
机构
[1] Univ Calgary, Dept Comp Sci, Calgary, AB T2N 1N4, Canada
关键词
D O I
10.1109/ALLERTON.2008.4797698
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A non-interactive conference key distribution scheme (NICKDS) is a system that allows selected sets of users to securely share a common key without interacting with each other. In this paper, we consider unconditionally secure setting where the is no limit on adversary's computation power. Unconditionally secure NICKDS has been considered with security against an adversary who can corrupt up to w users. We strengthen the security model of the system by allowing the adversary to also obtain conference keys of conferences whose members are honest, and use a game bases approach to define security. We give two other ways of defining security, using probability distance and mutual information and show the relationship between the three definitions of security.
引用
收藏
页码:1215 / 1220
页数:6
相关论文
共 50 条
  • [1] UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS
    Safavi-Naini, Reihaneh
    Jiang, Shaoquan
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (06) : 1369 - 1393
  • [2] Unconditionally secure dynamic conference key distribution
    Desmedt, Y
    Viswanathan, V
    [J]. 1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 383 - 383
  • [3] A unified model for unconditionally secure key distribution
    Cimato, Stelvio
    Cresti, Antonella
    D'Arco, Paolo
    [J]. JOURNAL OF COMPUTER SECURITY, 2006, 14 (01) : 45 - 64
  • [4] Unconditionally secure key distribution in higher dimensions by depolarization
    Chau, HF
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (04) : 1451 - 1468
  • [5] On unconditionally secure robust distributed Key Distribution Centers
    D'Arco, P
    Stinson, DR
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 346 - 363
  • [6] Collusion secure codes: Systematic security definitions and their relations
    Yoshioka, K
    Shikata, J
    Matsumoto, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (05): : 1162 - 1171
  • [7] Quantum Repeater Node Demonstrating Unconditionally Secure Key Distribution
    Langenfeld, S.
    Thomas, P.
    Morin, O.
    Rempe, G.
    [J]. PHYSICAL REVIEW LETTERS, 2021, 126 (23)
  • [8] Unconditionally secure key distribution based on two nonorthogonal states
    Tamaki, K
    Koashi, M
    Imoto, N
    [J]. PHYSICAL REVIEW LETTERS, 2003, 90 (16)
  • [9] On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption
    Stinson D.R.
    [J]. Designs, Codes and Cryptography, 1997, 12 (3) : 215 - 243
  • [10] Systematic treatment of collusion secure codes: Security definitions and their relations
    Yoshioka, K
    Shikata, J
    Matsumoto, T
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 408 - 421