Abstract
In this paper we analyze perfectly secure key distribution schemes for dynamic conferences. In this setting, any member of a group of t users can compute a common key using only his private initial piece of information and the identities of the other t - 1 users in the group. Keys are secure against coalitions of up to k users; that is, even if k users pool together their pieces they cannot compute anything about a key of any conference comprised of t other users. First we consider a noninteractive model where users compute the common key without any interaction. We prove the tight bound on the size of each user's piece of information of (k + t - 1t - 1) times the size of the common key. Then, we consider the model where interaction is allowed in the common key computation phase and show a gap between the models by exhibiting a one-round interactive scheme in which the user's information is only k + t - 1 times the size of the common key. Finally, we present its adaptation to network topologies with neighbourhood constraints and to asymmetric (e.g., client-server) communication models.
| Original language | English |
|---|---|
| Pages (from-to) | 1-23 |
| Number of pages | 23 |
| Journal | Information and Computation |
| Volume | 146 |
| Issue number | 1 |
| DOIs | |
| State | Published - 10 Oct 1998 |
| Externally published | Yes |
Bibliographical note
Funding Information:* Partially supported by Italian Ministry of University and Research Council for Research (CNR).
Funding
* Partially supported by Italian Ministry of University and Research Council for Research (CNR).
| Funders | Funder number |
|---|---|
| Ministry of University and Research Council for Research | |
| Consiglio Nazionale delle Ricerche |