J4

• Original Articles • Previous Articles     Next Articles

An intrusion-tolerant conference key distribution scheme

GUO Yuan-bo1,2;MA Jian-feng1

  

  1. (1. Ministry of Education Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China;
    2. The School of Electronic Technology, Information Engineering Univ. of PLA, Zhengzhou 450004, China)
  • Received:1900-01-01 Revised:1900-01-01 Online:2004-04-20 Published:2004-04-20

Abstract: This paper proposes a computationally secure and fault-tolerant conference key distribution scheme, which only requires the authenticated and encrypted point-to-point channels between each server and each user. By the combined use of knowledge proof and verifiable secret sharing, the scheme has the properties of simple structure and high security. Analysis shows that every honest user of a conference can get a common key after the running of the protocol, even if a minority of the servers malfunction or misbehave. We also show that on the assumption of a Diffie-Hellman decisional problem, a passive adversary gets zero knowledge about the conference key, and the active adversary cannot impersonate someone successfuly. Because the knowledge proof method we adopt is non-interactive, both operation and communication overheads are reduced, thus making the schemes very efficient.

Key words: conference key distribution, fault-tolerant, computationally secure, verifiable secret sharing, knowledge proof

CLC Number: 

  • TP309