Abstract
A conference key distribution is a protocol that allows designated subset of users to calculate a shared private key. We consider unconditionally secure conference key distribution systems where the adversary has unlimited computational power, and focuses on a stronger and more realistic adversary model, proposed by Safavi-Naini and Jiang, in which the adversary in addition to corrupting subsets of users and obtaining their private keys, can access the conference keys of a number of uncorrupted conferences. We consider alternative definitions of security with this adversary model and show the relationship between them. An important efficiency parameter for conference key distribution systems is the size of the users' private keys. We derive lower bounds on the size of this key and discuss the results in comparison with the known bounds. We also consider one-round Interactive Conference Key Distribution Systems (ICKDS) in the new adversarial model where the adversary in addition to learning the private keys of the corrupted users and a number of conference keys, has access to the transcripts of some conferences. We show that under this new adversary model, the previously proposed one round protocol of Blundo et. al. is no longer secure and we construct an ICKDS with provable security in the new adversarial model.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Foundations of Computer Science
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.