Perfectly secure key distribution for dynamic conferences

被引:158
作者
Blundo, C [1 ]
De Santis, A
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
[2] IBM Corp, TJ Watson Res Ctr, Yorktown Heights, NY 10598 USA
[3] CertCo, New York, NY 10004 USA
关键词
D O I
10.1006/inco.1998.2717
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we analyze perfectly secure key distribution schemes for dynamic conferences. In this setting, any member of a group of t users can compute a common key using only his private initial piece of information and the identities of the other t - 1 users in the group. Keys are secure against coalitions of up to k users; that is, even if k users pool together their pieces they cannot compute anything about a key of any conference comprised of t other users. First we consider a noninteractive model where users compute the common key without any interaction. We prove the tight bound on the size of each user's piece of information of ((k+t-1)(t-1)) times the size of the common key. Then, we consider the model where interaction is allowed in the common key computation phase and show a gap between the models by exhibiting a one-round interactive scheme in which the user's information is only k + t - 1 times the size of the common key. Finally, we present its adaptation to network topologies with neighbourhood constraints and to asymmetric (e.g., client-server) communication models, (C) 1998 Academic Press.
引用
收藏
页码:1 / 23
页数:23
相关论文
共 28 条
[1]  
BEIMEL A, 1994, LECT NOTES COMPUTER, V773, P444
[2]  
BIRD R, 1991, ADV CRYPTOLOGY, V576, P44
[3]  
BLOM R, 1984, ADV CRYPTOLOGY, V209, P335
[4]  
BLUNDO C, 1992, ADV CRYPTOLOGY CRYPT
[5]  
BLUNDO C, 1994, ADV CRYPTOLOGY EUROC
[6]  
BRICKELL E, 1987, ADV CRYPTOLOGY, V239, P418
[7]  
Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]  
FIAT A, 1994, ADV CRYPTOLOGY CRYPT, V773, P480
[10]  
FISCHER MJ, 1992, LECT NOTES COMPUT SC, V576, P141