Identity-based fault tolerant conference key agreement

Full text for this resource is not available from the Research Repository.

Yi, Xun (2004) Identity-based fault tolerant conference key agreement. IEEE transactions on dependable and secure computing, 1 (3). pp. 170-178. ISSN 1545-5971

Abstract

Lots of conference key agreement protocols have been suggested to secure computer network conference. Most of them operate only when all conferees are honest, but do not work when some conferees are malicious and attempt to delay or destruct the conference. Recently, Tzeng proposed a conference key agreement protocol with fault tolerance in terms that a common secret conference key among honest conferees can be established even if malicious conferees exist. In the case where a conferee can broadcast different messages in different subnetworks, Tzeng’s protocol is vulnerable to a “different key attack” from malicious conferees. In addition, Tzeng’s protocol requires each conferee to broadcast to the rest of the group and receive n 1 messages in a single round (where n stands for the number of conferees). Moreover, it has to handle n simultaneous broadcasts in one round. In this paper, we propose a novel fault-tolerant conference key agreement protocol, in which each conferee only needs to send one message to a “semitrusted” conference bridge and receive one broadcast message. Our protocol is an identity-based key agreement, built on elliptic curve cryptography. It is resistant to the different key attack from malicious conferees and needs less communication cost than Tzeng’s protocol.

Dimensions Badge

Altmetric Badge

Item type Article
URI https://vuir.vu.edu.au/id/eprint/1077
DOI 10.1109/TDSC.2004.31
Official URL http://ieeexplore.ieee.org/iel5/8858/29916/0136613...
Subjects Historical > Faculty/School/Research Centre/Department > School of Engineering and Science
Historical > RFCD Classification > 280000 Information, Computing and Communication Sciences
Keywords Computer network conference, conference key agreement, fault tolerance, semitrusted, passive and active attacks
Citations in Scopus 23 - View on Scopus
Download/View statistics View download statistics for this item

Search Google Scholar

Repository staff login