完整後設資料紀錄
DC 欄位語言
dc.contributor.authorTzeng, WGen_US
dc.contributor.authorTzeng, ZJen_US
dc.date.accessioned2014-12-08T15:45:52Z-
dc.date.available2014-12-08T15:45:52Z-
dc.date.issued2000en_US
dc.identifier.isbn3-540-41404-5en_US
dc.identifier.issn0302-9743en_US
dc.identifier.urihttp://hdl.handle.net/11536/30838-
dc.description.abstractA conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. In this paper we consider the distributed conference key (conference key agreement) protocol. We present two round-efficient conference key agreement protocols, which achieve the optimum in terms of the number of rounds. Our protocols are secure against both passive and active adversaries under the random oracle model. They release no useful information to passive adversaries and achieve fault tolerance against any coalition of malicious participants. We achieve the optimal round by transferring an interactive proof system to a non-interactive version, while preserving its security capability.en_US
dc.language.isoen_USen_US
dc.titleRound-efficient conference key agreement protocols with provable securityen_US
dc.typeArticle; Proceedings Paperen_US
dc.identifier.journalADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGSen_US
dc.citation.volume1976en_US
dc.citation.spage614en_US
dc.citation.epage627en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000174810100047-
顯示於類別:會議論文