
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
W.G. Tzeng, "A Secure FaultTolerant ConferenceKey Agreement Protocol," IEEE Transactions on Computers, vol. 51, no. 4, pp. 373379, April, 2002.  
BibTex  x  
@article{ 10.1109/12.995447, author = {W.G. Tzeng}, title = {A Secure FaultTolerant ConferenceKey Agreement Protocol}, journal ={IEEE Transactions on Computers}, volume = {51}, number = {4}, issn = {00189340}, year = {2002}, pages = {373379}, doi = {http://doi.ieeecomputersociety.org/10.1109/12.995447}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Computers TI  A Secure FaultTolerant ConferenceKey Agreement Protocol IS  4 SN  00189340 SP373 EP379 EPD  373379 A1  W.G. Tzeng, PY  2002 KW  conference key KW  provable security KW  fault tolerance VL  51 JA  IEEE Transactions on Computers ER   
When a group of people want to communicate securely over an open network, they run a conferencekey protocol to establish a common conference key K such that all their communications thereafter are encrypted with the key K. In this paper, we propose a provably secure faulttolerant conferencekey agreement protocol under the authenticated broadcast channel model. We show that a passive adversary gets zero knowledge about the conference key established by the honest participants under the assumption of a variant DiffieHellman decision problem. We also show that the honest participants can agree on a common conference key no matter how many participants are malicious. Furthermore, we show that even if the broadcast channel is not authenticated, our protocol is secure against impersonators under the random oracle model.
[1] M. Bellare and P. Rogaway, “Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols,” Proc. First ACM Conf. Computer and Comm. Security, pp. 6273, 1993.
[2] M. Bellare and P. Rogaway, “The Exact Security of Digital Signatures, How to Sign with RSA and Rabin,” Proc. Advances in Cryptology—Eurocrypt '96, pp. 399416, 1996.
[3] M. BenOr, S. Goldwasser, and A. Wigderson, “Completeness Theorems for NonCryptographic FaultTolerant Distributed Computation,” Proc. 20th ACM Symp. Theory of Computing, pp. 110, 1988.
[4] S. Berkovits, “How to Broadcast a Secret,” Proc. Advances in Cryptology—Eurocrypt '91, pp. 535541, 1991.
[5] R. Blom, “An Optimal Class of Symmetric Key Generation Systems,” Proc. Advances in Cryptology—Eurocrypt '84, pp. 335338, 1985.
[6] C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “PerfectlySecure Key Distribution for Dynamic Conferences,” Proc. Advances in Cryptology—Crypto '92, pp. 471486, 1993.
[7] D. Boneh and R. Venkatesan, “Hardness of Computing the Most Significant Bits of Secret Keys in DiffieHellman and Related Problems,” Proc. Advances in Cryptology—Crypto '96, pp. 129142, 1996.
[8] M. Burmester and Y. Desmedt, “A Secure and Efficient Conference Key Distribution System,” Proc. Advances in Cryptology—Eurocrypt '94, pp. 275286, 1995.
[9] R. Canetti and A. Herzberg, “Maintaining Security in the Presence of Transient Faults,” Proc. Advances in Cryptology—Crypto '94, pp. 425438, 1994.
[10] C.C. Chang and C.H. Lin, “How to Converse Securely in a Conference,” Proc. IEEE 30th Ann. Int'l Carnahan Conf., pp. 4245, 1996.
[11] C.C. Chang, T.C. Wu, and C.P. Chen, “The Design of a Conference Key Distribution System,” Proc. Advances in Cryptology—Auscrypt '92, pp. 459466, 1992.
[12] W. Diffie and M.E. Hellman, New Directions in Cryptography IEEE Trans. Information Theory, vol. 22, pp. 644654, 1976.
[13] W. Diffie, P.C. van Oorschot, and M.J. Weiner, “Authentication and Authenticated Key Exchanges,” Design, Codes and Cryptography, vol. 2, pp. 107125, 1992.
[14] M. Fitzi, M. Hirt, and U. Maurer, “Trading Correctness for Privacy in Unconditional MultiParty Compution,” Proc. Advances in Cryptology—Crypto '98, pp. 121136, 1998.
[15] T.L. Hwang and J.L. Chen, “IdentityBased Conference Key Broadcast Systems,” IEE Proc.: Computers and Digital Techniques, vol. 141, no. 1, pp. 5760, 1994.
[16] I. Ingemarsson, D.T. Tang, and C.K. Wong, “A Conference Key Distribution System,” IEEE Trans. Information Theory, vol. 28, no. 5, pp. 714720, 1982.
[17] B. Klein, M. Otten, and T. Beth, “Conference Key Distribution Protocols in Distributed Systems,” Proc. Codes and Ciphers—Cryptography and Coding IV, pp. 225242, 1995.
[18] K. Koyama, “Secure Conference Key Distribution Schemes for Conspiracy Attack,” Proc. Advances in Cryptology—Eurocrypt '92, pp. 449453, 1993.
[19] K. Koyama and K. Ohta, “IdentityBased Conference Key Distribution Systems,” Proc. Advances in Cryptology—Crypto '87, pp. 175184, 1988.
[20] K. Koyama and K. Ohta, “Security of Improved IdentityBased Conference Key Distributioin Systems,” Proc. Advances in Cryptology—Eurocrypt '88, pp. 1119, 1988.
[21] T. Matsumoto and H. Imai, “On the Key Predistribution System: A Practical Solution to the Key Distribution Problem,” Proc. Advances in Cryptology—Crypto '87, pp. 185193, 1988.
[22] C. Mitchell, F. Piper, and P. Wild, “Digital Signature,” Contempary Cryptography, The Science of Information Integrity, pp. 325378, 1992.
[23] M. Naor and O. Reingold, “NumberTheoretic Constructions of Efficient Pseudorandom Functions,” Proc. 38th IEEE Symp. Foundations of Computer Science, 1997.
[24] D. Pointcheval and J. Stern, “Security Proofs for Signatue Schemes,” Proc. Advances in Cryptology—Eurocrypt '96, pp. 387398, 1996.
[25] T. Rabin and M. BenOr, “Verifiable Secret Sharing and Multiparty Protocols with Honest Majority,” Proc. 26th ACM Symp. Theory of Computing, pp. 7385, 1989.
[26] R. Rueppel and P. Van Oorschot, “Modern Key Agreement Techniques,” Computer Comm., 1994.
[27] A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612613, 1979.
[28] A. Shimbo and S. Kawamura, “Cryptanalysis of Several Conference Key Distribution Schemes,” Proc. Advances in Cryptology—Asiacrypt '91, pp. 265276, 1993.
[29] V. Shoup, “Lower Bounds for Discrete Logarithms and Related Problems,” Proc. Advances in Cryptology—Eurocrypt '97, pp. 256266, 1997.
[30] D. Steer, L. Strawczynski, W. Diffie, and M. Wiener, “A Secure Audio Teleconference System,” Proc. Advances in Cryptology—Crypto '88, pp. 520528, 1990.
[31] T.C. Wu, “Conference Key Distribution System with User Anonymity Based on Algebraic Approach,” IEE Proc.: Computers and Digital Techniques, vol. 144, no. 2, pp. 145148, 1997.
[32] Y. Yacobi, “Attack on the KoyamaOhta Identity Based Key Distribution Scheme,” Proc. Advances in Cryptology—Crypto '87, pp. 429433, 1988.