Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tzeng, WG | en_US |
dc.date.accessioned | 2014-12-08T15:45:53Z | - |
dc.date.available | 2014-12-08T15:45:53Z | - |
dc.date.issued | 2000 | en_US |
dc.identifier.isbn | 3-540-66967-1 | en_US |
dc.identifier.issn | 0302-9743 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/30848 | - |
dc.description.abstract | When a group of people wants to communicate securely over an open network, they run a conference-key protocol to establish a common conference key K such that all their communications thereafter are encrypted with the key K. In this paper we propose a practical and provably secure fault-tolerant conference-key agreement protocol under the authenticated broadcast channel model. The adversary that attacks our protocol can be either active or passive. An active adversary (malicious participant) tries to disrupt establishment of a common conference key among the honest participants, while a passive adversary tries to learn the conference key by listening to the communication of participants. We show that a passive adversary gets no information (zero knowledge) about the conference key established by the honest participants under the assumption of a variant Diffie-Hellman decision problem. We also show that the honest participants can agree on a common conference key no matter how many participants are malicious. | en_US |
dc.language.iso | en_US | en_US |
dc.title | A practical and secure fault-tolerant conference-key agreement protocol | en_US |
dc.type | Article; Proceedings Paper | en_US |
dc.identifier.journal | PUBLIC KEY CRYTOGRAPHY | en_US |
dc.citation.volume | 1751 | en_US |
dc.citation.spage | 1 | en_US |
dc.citation.epage | 13 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000165144300001 | - |
Appears in Collections: | Conferences Paper |