Abstract
With the progress of information technology, the computer crimes are emerging in an endless stream. User's privacy should be protected. When a user submits a service request to a service provider, both should check the identity of each other and build a shared key to accomplish the service request. Furthermore, when a conference is held, the chairman must verify the identities of all participants. Afterwards, the chairman chooses a conference key and distributes it to legitimate participants. Besides, the participants should know who is in the conference. These manners prevent the malicious adversary from eavesdropping or impersonating to get some benefits. From mentioned above, we adopt identity-based cryptosystem and elliptic curve cryptosystem to propose a privacy-preserved conference key distribution protocol.
Original language | English |
---|---|
Title of host publication | 2017 12th International Conference on Digital Information Management, ICDIM 2017 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 127-132 |
Number of pages | 6 |
ISBN (Electronic) | 9781538606643 |
DOIs | |
State | Published - 28 06 2017 |
Externally published | Yes |
Event | 12th International Conference on Digital Information Management, ICDIM 2017 - Fukuoka, Japan Duration: 12 09 2017 → 14 09 2017 |
Publication series
Name | 2017 12th International Conference on Digital Information Management, ICDIM 2017 |
---|---|
Volume | 2018-January |
Conference
Conference | 12th International Conference on Digital Information Management, ICDIM 2017 |
---|---|
Country/Territory | Japan |
City | Fukuoka |
Period | 12/09/17 → 14/09/17 |
Bibliographical note
Publisher Copyright:© 2017 IEEE.
Keywords
- conference key
- identity-based
- key distribution
- user privacy