Please use this identifier to cite or link to this item:
http://hdl.handle.net/11455/68555
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tseng, Y.M. | en_US |
dc.contributor.author | Jan, J.K. | en_US |
dc.date | 1999 | zh_TW |
dc.date.accessioned | 2014-06-11T05:56:58Z | - |
dc.date.available | 2014-06-11T05:56:58Z | - |
dc.identifier.issn | 0140-3664 | zh_TW |
dc.identifier.uri | http://hdl.handle.net/11455/68555 | - |
dc.description.abstract | In 1997, Wu [T.C. Wu, Conference key distribution system with user anonymity based on algebraic approach, IEE Proc. Comput. Digit. Tech. 144(2) (1997) 145-148] proposed a conference key distribution system (CKDS) with user anonymity using algebraic operations. User anonymity is, in which the identities of participants in a conference are anonymous to each other, except for the chairperson. In this article, two CKDSs with user anonymity are proposed. One is a modified one of the Wu's scheme that uses simple interpolating properties of polynomials to replace the algebraic approach. Both the Wu's original scheme and our modified one require a one-way hash function to hide the identities of participants and to protect each participant's common key shared with the chairperson. Both schemes also use the one-way hash function to provide the authentication for the chairperson. Moreover, we propose another scheme which does not use a one-way hash function, but also achieve the same purposes. Compared to the Wu's scheme, both our schemes require less computing time. The security of the proposed CKDSs is based on the difficulty of computing the discrete logarithm problem as well as the one-way hash cryptographic function assumption. Both schemes are secure against impersonation and conspiracy attacks. (C) 1999 Elsevier Science B.V. All rights reserved. | en_US |
dc.language.iso | en_US | zh_TW |
dc.relation | Computer Communications | en_US |
dc.relation.ispartofseries | Computer Communications, Volume 22, Issue 8, Page(s) 749-754. | en_US |
dc.relation.uri | http://dx.doi.org/10.1016/s0140-3664(99)00034-1 | en_US |
dc.subject | cryptography | en_US |
dc.subject | conference key distribution system | en_US |
dc.subject | user anonymity | en_US |
dc.subject | one-way hash function | en_US |
dc.subject | discrete logarithm | en_US |
dc.title | Anonymous conference key distribution systems based on the discrete logarithm problem | en_US |
dc.type | Journal Article | zh_TW |
dc.identifier.doi | 10.1016/s0140-3664(99)00034-1 | zh_TW |
item.cerifentitytype | Publications | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.languageiso639-1 | en_US | - |
item.fulltext | no fulltext | - |
item.grantfulltext | none | - |
item.openairetype | Journal Article | - |
Appears in Collections: | 期刊論文 |
TAIR Related Article
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.