Multi-party key agreement protocols with cheater identification

被引:2
作者
Tseng, YM [1 ]
机构
[1] Chao Yang Univ Technol, Dept Informat & Commun Engn, Taichung 413, Taiwan
关键词
cryptography; secret sharing; identification; polynomial; Lagrange interpolation;
D O I
10.1016/S0096-3003(02)00537-4
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In 2000, Pieprzyk and Li proposed two multi-party key agreement protocols based on secret sharing. The proposed protocols can achieve the following security goals: key freshness, key confidentiality, group authentication and key confirmation. However, this article points out that their protocols have a weakness for practical applications. A dishonest principal may disturb the protocol to fail, but anyone cannot identify the fraudulent principal. Therefore, an efficient cheater identification process is essential for multi-party key agreement protocols. Two improvements on their protocols are respectively proposed to remove this weakness. In our protocols, the extra computation overhead is small and security goals are not impaired. (C) 2002 Elsevier Inc. All rights reserved.
引用
收藏
页码:551 / 559
页数:9
相关论文
共 12 条
[1]   Efficient cheater identification method for threshold schemes [J].
Chang, CC ;
Hwang, RJ .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01) :23-27
[2]  
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[3]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[4]   CONFERENCE KEY DISTRIBUTION SCHEMES FOR SECURE DIGITAL MOBILE COMMUNICATIONS [J].
HWANG, MS ;
YANG, WP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1995, 13 (02) :416-420
[5]   A concept of designing cheater identification methods for secret sharing [J].
Hwang, RJ ;
Lee, WB ;
Chang, CC .
JOURNAL OF SYSTEMS AND SOFTWARE, 1999, 46 (01) :7-11
[6]   A CONFERENCE KEY DISTRIBUTION-SYSTEM [J].
INGEMARSSON, I ;
TANG, DT ;
WONG, CK .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1982, 28 (05) :714-720
[7]  
Just M., 1996, Advances in Cryptology - ASIACRYPT'96 International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings, P36, DOI 10.1007/BFb0034833
[8]  
Menezes A. J, 1997, HDB APPL CRYPTOGRAPH
[9]   Multiparty key agreement protocols [J].
Pieprzyk, J ;
Li, CH .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2000, 147 (04) :229-236
[10]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613