完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Tzeng, WG | en_US |
dc.contributor.author | Tzeng, ZJ | en_US |
dc.date.accessioned | 2014-12-08T15:45:52Z | - |
dc.date.available | 2014-12-08T15:45:52Z | - |
dc.date.issued | 2000 | en_US |
dc.identifier.isbn | 3-540-41404-5 | en_US |
dc.identifier.issn | 0302-9743 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/30838 | - |
dc.description.abstract | A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. In this paper we consider the distributed conference key (conference key agreement) protocol. We present two round-efficient conference key agreement protocols, which achieve the optimum in terms of the number of rounds. Our protocols are secure against both passive and active adversaries under the random oracle model. They release no useful information to passive adversaries and achieve fault tolerance against any coalition of malicious participants. We achieve the optimal round by transferring an interactive proof system to a non-interactive version, while preserving its security capability. | en_US |
dc.language.iso | en_US | en_US |
dc.title | Round-efficient conference key agreement protocols with provable security | en_US |
dc.type | Article; Proceedings Paper | en_US |
dc.identifier.journal | ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS | en_US |
dc.citation.volume | 1976 | en_US |
dc.citation.spage | 614 | en_US |
dc.citation.epage | 627 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000174810100047 | - |
顯示於類別: | 會議論文 |