Privacy-preserved conference key distribution protocol

Chien Lung Hsu, Tzu Wei Lin, Huang Chia Lu, Tzu Hsien Chuang, Yu Han Chen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

With the progress of information technology, the computer crimes are emerging in an endless stream. User's privacy should be protected. When a user submits a service request to a service provider, both should check the identity of each other and build a shared key to accomplish the service request. Furthermore, when a conference is held, the chairman must verify the identities of all participants. Afterwards, the chairman chooses a conference key and distributes it to legitimate participants. Besides, the participants should know who is in the conference. These manners prevent the malicious adversary from eavesdropping or impersonating to get some benefits. From mentioned above, we adopt identity-based cryptosystem and elliptic curve cryptosystem to propose a privacy-preserved conference key distribution protocol.

Original languageEnglish
Title of host publication2017 12th International Conference on Digital Information Management, ICDIM 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages127-132
Number of pages6
ISBN (Electronic)9781538606643
DOIs
StatePublished - 28 06 2017
Externally publishedYes
Event12th International Conference on Digital Information Management, ICDIM 2017 - Fukuoka, Japan
Duration: 12 09 201714 09 2017

Publication series

Name2017 12th International Conference on Digital Information Management, ICDIM 2017
Volume2018-January

Conference

Conference12th International Conference on Digital Information Management, ICDIM 2017
Country/TerritoryJapan
CityFukuoka
Period12/09/1714/09/17

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

Keywords

  • conference key
  • identity-based
  • key distribution
  • user privacy

Fingerprint

Dive into the research topics of 'Privacy-preserved conference key distribution protocol'. Together they form a unique fingerprint.

Cite this