Indexed by:
Abstract:
A conference-key protocol is used to establish a common conference key K such that a group of people can communicate securely over a public network. To improve the implementation efficiency of Tzeng's conference-key agreement protocol, an efficient conference-key agreement protocol is proposed under the authenticated broadcast channel. First, the improved protocol is round-efficient, and relaxes the waiting time for fault-check. Second, it reduces the computational complexity by revoking the signature procedure in the Tzeng's protocol. It is provably secure in the standard model under the DDH assumption.
Keyword:
Reprint Author's Address:
Email:
Source :
2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS
Year: 2008
Page: 877-881
Language: English
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 0