The design of a conference key distribution system

19Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we propose a conference key distribution system for generating a common secret key for two or more users. In our system, each user possesses a secret key and a public key. Initially, the chairperson constructs a conference key associated with his secret key and the conference members' public keys. Then each member can obtain and authenticate the conference key by using his secret key. Further, we have shown that the security of our proposed system is based on the difficulty of breaking the Diffie-Hellman key distribution system.

Cite

CITATION STYLE

APA

Chang, C. C., Wu, T. C., & Chen, C. P. (1993). The design of a conference key distribution system. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 718 LNCS, pp. 459–466). Springer Verlag. https://doi.org/10.1007/3-540-57220-1_83

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free