Conference key agreement protocol using oblivious transfer

Ari Moesriami Barmawi, Shingo Takada, Norihisa Doi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The basic idea of our protocol is establishing a conference key based on oblivious transfer which can be used in either asymmetric or symmetric cryptography, such that we can reduce the number of decryptions for the key confirmation without sacrificing the level of security. In our proposed method, we break the conference key into several individual secret keys in accordance with the amount of members within the group. This individual key will be used by each member to sign (encrypt (asymmetrically)) the established conference key in the key confirmation procedure. Then, each member multiplies all signed conference keys and decrypting (asymmetrically) the multiplied signed conference key using the multiplicative inverse of his locally calculated conference key. Thus, each member only needs to perform one decryption for the key confirmation. Furthermore, by using the individual secret key, each member can directly communicate with each other by a support of the leader, while the leader does not gain any knowledge of messages which is exchanged between the communicating members. The last features can not be found in the previous method except in Li-Pieprzyk's. However, for the key generation we need only a less modular exponentiations than the former.

Original languageEnglish
Title of host publicationIFIP Advances in Information and Communication Technology
PublisherSpringer New York LLC
Pages347-354
Number of pages8
Volume73
ISBN (Print)0792375149, 9780792375142
Publication statusPublished - 2001
EventIFIP TC11 / WG11.3 14th Annual Working Conference on Database Security - Schoorl, Netherlands
Duration: 2000 Aug 212000 Aug 23

Publication series

NameIFIP Advances in Information and Communication Technology
Volume73
ISSN (Print)18684238

Other

OtherIFIP TC11 / WG11.3 14th Annual Working Conference on Database Security
CountryNetherlands
CitySchoorl
Period00/8/2100/8/23

Fingerprint

Cryptography

Keywords

  • Conference key
  • Individual key
  • Oblivious transfer

ASJC Scopus subject areas

  • Information Systems and Management

Cite this

Barmawi, A. M., Takada, S., & Doi, N. (2001). Conference key agreement protocol using oblivious transfer. In IFIP Advances in Information and Communication Technology (Vol. 73, pp. 347-354). (IFIP Advances in Information and Communication Technology; Vol. 73). Springer New York LLC.

Conference key agreement protocol using oblivious transfer. / Barmawi, Ari Moesriami; Takada, Shingo; Doi, Norihisa.

IFIP Advances in Information and Communication Technology. Vol. 73 Springer New York LLC, 2001. p. 347-354 (IFIP Advances in Information and Communication Technology; Vol. 73).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Barmawi, AM, Takada, S & Doi, N 2001, Conference key agreement protocol using oblivious transfer. in IFIP Advances in Information and Communication Technology. vol. 73, IFIP Advances in Information and Communication Technology, vol. 73, Springer New York LLC, pp. 347-354, IFIP TC11 / WG11.3 14th Annual Working Conference on Database Security, Schoorl, Netherlands, 00/8/21.
Barmawi AM, Takada S, Doi N. Conference key agreement protocol using oblivious transfer. In IFIP Advances in Information and Communication Technology. Vol. 73. Springer New York LLC. 2001. p. 347-354. (IFIP Advances in Information and Communication Technology).
Barmawi, Ari Moesriami ; Takada, Shingo ; Doi, Norihisa. / Conference key agreement protocol using oblivious transfer. IFIP Advances in Information and Communication Technology. Vol. 73 Springer New York LLC, 2001. pp. 347-354 (IFIP Advances in Information and Communication Technology).
@inproceedings{21285d1d87d84b7ab68038fa734a153e,
title = "Conference key agreement protocol using oblivious transfer",
abstract = "The basic idea of our protocol is establishing a conference key based on oblivious transfer which can be used in either asymmetric or symmetric cryptography, such that we can reduce the number of decryptions for the key confirmation without sacrificing the level of security. In our proposed method, we break the conference key into several individual secret keys in accordance with the amount of members within the group. This individual key will be used by each member to sign (encrypt (asymmetrically)) the established conference key in the key confirmation procedure. Then, each member multiplies all signed conference keys and decrypting (asymmetrically) the multiplied signed conference key using the multiplicative inverse of his locally calculated conference key. Thus, each member only needs to perform one decryption for the key confirmation. Furthermore, by using the individual secret key, each member can directly communicate with each other by a support of the leader, while the leader does not gain any knowledge of messages which is exchanged between the communicating members. The last features can not be found in the previous method except in Li-Pieprzyk's. However, for the key generation we need only a less modular exponentiations than the former.",
keywords = "Conference key, Individual key, Oblivious transfer",
author = "Barmawi, {Ari Moesriami} and Shingo Takada and Norihisa Doi",
year = "2001",
language = "English",
isbn = "0792375149",
volume = "73",
series = "IFIP Advances in Information and Communication Technology",
publisher = "Springer New York LLC",
pages = "347--354",
booktitle = "IFIP Advances in Information and Communication Technology",

}

TY - GEN

T1 - Conference key agreement protocol using oblivious transfer

AU - Barmawi, Ari Moesriami

AU - Takada, Shingo

AU - Doi, Norihisa

PY - 2001

Y1 - 2001

N2 - The basic idea of our protocol is establishing a conference key based on oblivious transfer which can be used in either asymmetric or symmetric cryptography, such that we can reduce the number of decryptions for the key confirmation without sacrificing the level of security. In our proposed method, we break the conference key into several individual secret keys in accordance with the amount of members within the group. This individual key will be used by each member to sign (encrypt (asymmetrically)) the established conference key in the key confirmation procedure. Then, each member multiplies all signed conference keys and decrypting (asymmetrically) the multiplied signed conference key using the multiplicative inverse of his locally calculated conference key. Thus, each member only needs to perform one decryption for the key confirmation. Furthermore, by using the individual secret key, each member can directly communicate with each other by a support of the leader, while the leader does not gain any knowledge of messages which is exchanged between the communicating members. The last features can not be found in the previous method except in Li-Pieprzyk's. However, for the key generation we need only a less modular exponentiations than the former.

AB - The basic idea of our protocol is establishing a conference key based on oblivious transfer which can be used in either asymmetric or symmetric cryptography, such that we can reduce the number of decryptions for the key confirmation without sacrificing the level of security. In our proposed method, we break the conference key into several individual secret keys in accordance with the amount of members within the group. This individual key will be used by each member to sign (encrypt (asymmetrically)) the established conference key in the key confirmation procedure. Then, each member multiplies all signed conference keys and decrypting (asymmetrically) the multiplied signed conference key using the multiplicative inverse of his locally calculated conference key. Thus, each member only needs to perform one decryption for the key confirmation. Furthermore, by using the individual secret key, each member can directly communicate with each other by a support of the leader, while the leader does not gain any knowledge of messages which is exchanged between the communicating members. The last features can not be found in the previous method except in Li-Pieprzyk's. However, for the key generation we need only a less modular exponentiations than the former.

KW - Conference key

KW - Individual key

KW - Oblivious transfer

UR - http://www.scopus.com/inward/record.url?scp=84904259192&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84904259192&partnerID=8YFLogxK

M3 - Conference contribution

SN - 0792375149

SN - 9780792375142

VL - 73

T3 - IFIP Advances in Information and Communication Technology

SP - 347

EP - 354

BT - IFIP Advances in Information and Communication Technology

PB - Springer New York LLC

ER -