1993
DOI: 10.1007/3-540-48071-4_33
|View full text |Cite
|
Sign up to set email alerts
|

Perfectly-Secure Key Distribution for Dynamic Conferences

Abstract: A key distribution scheme for dynamic conferences is a method by which initially an (off-line) trusted server distributes private individual pieces of information to a set of users. Later any group of users of a given size (a dynamic conference) is able to compute a common secure key. In this paper we study the theory and applications of such perfectly secure systems, In this setting, any group of t users can compute a common key by each user computing using only his private piece of information and the identi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
183
0

Year Published

2000
2000
2015
2015

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 672 publications
(183 citation statements)
references
References 17 publications
(4 reference statements)
0
183
0
Order By: Relevance
“…From this coordinate, the destination node finds out the common polynomial that it shares with the broadcasting node if at all. Now, the common key can be calculated using the same method as [5].…”
Section: Lemma 15 When S Ij Number Of Nodes Are Compromised In Groupmentioning
confidence: 99%
See 3 more Smart Citations
“…From this coordinate, the destination node finds out the common polynomial that it shares with the broadcasting node if at all. Now, the common key can be calculated using the same method as [5].…”
Section: Lemma 15 When S Ij Number Of Nodes Are Compromised In Groupmentioning
confidence: 99%
“…However, in their schemes, only a single node is deployed in a square region as opposed to our scheme where there are a group of nodes deployed in a region. They used the polynomial-based scheme of Blundo et al [5]. The deployment region is broken down into equal-sized squares …”
Section: Comparison With Other Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…• Information-theoretic methods, such as Blundo's Symmetric Polynomials (BSP) [7] and Chiou-Chen's Secure Lock (CSL) [10], require large amounts of space per user and scale exponentially with the number of members in a group. [19].…”
Section: Key Managementmentioning
confidence: 99%