1998
DOI: 10.1006/inco.1998.2717
|View full text |Cite
|
Sign up to set email alerts
|

Perfectly Secure Key Distribution for Dynamic Conferences

Abstract: A key distribution scheme for dynamic conferences is a method by which initially an (off-line) trusted server distributes private individual pieces of information to a set of users. Later any group of users of a given size (a dynamic conference) is able to compute a common secure key. In this paper we study the theory and applications of such perfectly secure systems, In this setting, any group of t users can compute a common key by each user computing using only his private piece of information and the identi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
559
0
6

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 420 publications
(566 citation statements)
references
References 12 publications
1
559
0
6
Order By: Relevance
“…For many applications this tradeoff is likely to favour the Blom scheme. The Blom key predistribution scheme easily generalises to key predistribution applications where groups of t nodes require common keys [3]. It was further shown that this approach is optimal with respect to node key storage.…”
Section: The Rise and Fall Of Combinatorial Key Predistributionmentioning
confidence: 99%
“…For many applications this tradeoff is likely to favour the Blom scheme. The Blom key predistribution scheme easily generalises to key predistribution applications where groups of t nodes require common keys [3]. It was further shown that this approach is optimal with respect to node key storage.…”
Section: The Rise and Fall Of Combinatorial Key Predistributionmentioning
confidence: 99%
“…If an intermediate node u i , whose previous hop is u j , decides to inscribe the packet, it will update the value of F = F ⊕ H ki (M |u i ), here k i is the pairwise key shared between u i and V . Note that a node can easily compute its pairwise key shared with another node given each other's id [15][16][17]. The MAC of M |u i serves as its "footprint" and we will see in the verification phase how it helps detect the marks in Q from being removed starting from the end.…”
Section: Revised Mark Designmentioning
confidence: 99%
“…Nodes can establish trust through either a PKI, a Trusted Third Party (TTP), or predistributed shared keys. Further, any two nodes in the network, as long as knowing each other's id, can efficiently establish a pairwise key based on one of the existing schemes [15][16][17]. The key used in the message authentication code (MAC) generation at an intermediate node is its pairwise key share with the victim node.…”
Section: Network Model and Security Assumptionsmentioning
confidence: 99%
“…Many pairwise key establishment schemes [16][17][18] allow two nodes to establish a pairwise key on the fly as long as they know each other's id. In our work, we choose the Blundo scheme [20] for our solution since the Blundo scheme provides clear security guarantee and eases our presentation. In the Blundo scheme, a bivariate symmetric polynomial f (x, y) with degree of t is chosen in advance and f (i, y) is preloaded on sensor i.…”
Section: Network Model and Security Assumptionsmentioning
confidence: 99%