Abstract
The basic idea of our protocol is establishing a conference key based on oblivious transfer which can be used in either asymmetric or symmetric cryptography, such that we can reduce the number of decryptions for the key confirmation without sacrificing the level of security. In our proposed method, we break the conference key into several individual secret keys in accordance with the amount of members within the group. This individual key will be used by each member to sign (encrypt (asymmetrically)) the established conference key in the key confirmation procedure. Then, each member multiplies all signed conference keys and decrypting (asymmetrically) the multiplied signed conference key using the multiplicative inverse of his locally calculated conference key.
Thus, each member only needs to perform one decryption for the key confirmation. Furthermore, by using the individual secret key, each member can directly communicate with each other by a support of the leader, while the leader does not gain any knowledge of messages which is exchanged between the communicating members. The last features can not be found in the previous method except in Li-Pieprzyk’s. However, for the key generation we need only a less modular exponentiations than the former.
Chapter PDF
References
Burmester, M. and Desmedt, Y. G., Efficient and Secure Conference Key Distribution, Proceeding of Security Protocols International Workshop Cambridge, United Kingdom, Springer-Verlag, LNCS 1189, April 1996, pp. 119–129.
Just, M. and Vaudenay, S., Authenticated Multy-Party Key Agreement, Advances in Cryptology ASIACRYPT’ 96, Springer-Verlag, LNCS 1163, 1996.
Boyd, C., On key agreement and Conference Key Agreement, Proceeding of Information Security and Privacy Australasian Conference (ACISP), Springer-Verlag, LNCS 1270, 1997, pp 294–302
Boyd, C., Towards a Classification of Key Agreement Protocols, Proceeding of Computer Security Foundation Workshop, 1995, pp. 38–43.
Li, C. and Pieprzyk, J., Conference Key Agreement from Secret Sharing, Proceeding of ACISP 1999, Springer-Verlag, pp 64–76.
Goldreich, O., Secure Multy-Party Computation, Working Draft, Download from the Internet, June 1998.
Gilboa, N., Two RSA Key Generation, Crypto 99, LNCS1666, Springer Verlag, 1999, pp. 116–129.
Adler, A. and Coury, John E., The Theory of Numbers, Jones and Barlett, 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Kluwer Academic Publishers
About this chapter
Cite this chapter
Moesriami Barmawi, A., Takada, S., Doi, N. (2002). Conference Key Agreement Protocol using Oblivious Transfer. In: Thuraisingham, B., van de Riet, R., Dittrich, K.R., Tari, Z. (eds) Data and Application Security. IFIP International Federation for Information Processing, vol 73. Springer, Boston, MA. https://doi.org/10.1007/0-306-47008-X_31
Download citation
DOI: https://doi.org/10.1007/0-306-47008-X_31
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-7923-7514-2
Online ISBN: 978-0-306-47008-0
eBook Packages: Springer Book Archive