https://scholars.lib.ntu.edu.tw/handle/123456789/352528
Title: | A Conference Key Agreement Protocol with Fault-tolerant Capability | Authors: | Huang, Kuo-Hsuan Chung, Yu-Fang Lee, Hsiu-Hui FEI-PEI LAI Chen, Tzer-Shyong |
Keywords: | Conference key; Discrete logarithm problem; Fault tolerance; Key agreement | Issue Date: | Feb-2009 | Journal Volume: | 31 | Journal Issue: | 2 | Start page/Pages: | 401-405 | Source: | The Journal of Computer Standards & Interfaces | Abstract: | Secure communication is of utmost importance to participants of Internet conferences. Secure communication thwarts eavesdropping. In an Internet conference, all conference participants together establish a common conference key to enable multi-party and secure exchange of messages. However, malicious conference participants may try to obtain the conference key through unfair means, and this could result in the generation of different conference keys. This paper is intended as a proposal of a new form of conference key agreement protocol. It emphasizes the filtering of malicious participants at the beginning of the conference to ensure that all participants obtain the same conference key. The proposed method also has fault-tolerant capability. Efficiency and security of a protocol is important in practice. The security of the proposed protocol is based on discrete logarithm problem assumption. The protocol is executed in computationally secure environment. The secret information of a user cannot be determined from its corresponding public information and therefore ensures privacy. Since efficiency of a protocol depends on low computation cost, the protocol attempts to achieve lower computation cost without compromising on security. © 2008 Elsevier B.V. All rights reserved. |
URI: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-56049116231&doi=10.1016%2fj.csi.2008.05.015&partnerID=40&md5=27f8b60967502ec90a37b4cb45bd30c3 | DOI: | 10.1016/j.csi.2008.05.015 | SDG/Keyword: | Algebra; Fault tolerance; Internet; Quality assurance; Reliability; Security of data; Computation costs; Conference key; Conference key agreements; Conference keys; Discrete logarithm problem; Discrete Logarithm problems; Fault-tolerant; Key agreement; Malicious participants; New forms; Public informations; Secret informations; Secure communications; Internet protocols |
Appears in Collections: | 生醫電子與資訊學研究所 |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.