In this paper, we propose a conference key distribution system for generating a common secret key for two or more users. In our system, each user possesses a secret key and a public key. Initially, the chairperson constructs a conference key associated with his secret key and the conference members' public keys. Then each member can obtain and authenticate the conference key by using his secret key. Further, we have shown that the security of our proposed system is based on the difficulty of breaking the Diffie-Hellman key distribution system.
CITATION STYLE
Chang, C. C., Wu, T. C., & Chen, C. P. (1993). The design of a conference key distribution system. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 718 LNCS, pp. 459–466). Springer Verlag. https://doi.org/10.1007/3-540-57220-1_83
Mendeley helps you to discover research relevant for your work.