{"title":"用于多方通信服务的密钥交换协议","authors":"Chao-Wen Chan, Chinchen Chang","doi":"10.1109/CW.2002.1180885","DOIUrl":null,"url":null,"abstract":"Network technology is improving distributed applications. The parties in distributed applications need to exchange secret information to perform a specific task, and these parties form a specific group. Secret message exchanges in the group are likely to be in a secret conference over a network. To perform secret message exchange, one needs a common secret key to encrypt or decrypt messages. The basic idea behind our method is to pass a secret line through a published point. Any attacker who uses only one point cannot recover the secret line. Only the party who knows two points of the secret line can recover the line. Based on this idea, we propose new key exchange protocols and a message exchange protocol. The secret key established through the proposed method is a set of the secret points. Moreover, because the secret key is a set of secret points, it can support the dynamic part of a dynamic peer group that allows new parties to join and parties to leave the group.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"144 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Key exchange protocols for multiparty communication services\",\"authors\":\"Chao-Wen Chan, Chinchen Chang\",\"doi\":\"10.1109/CW.2002.1180885\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network technology is improving distributed applications. The parties in distributed applications need to exchange secret information to perform a specific task, and these parties form a specific group. Secret message exchanges in the group are likely to be in a secret conference over a network. To perform secret message exchange, one needs a common secret key to encrypt or decrypt messages. The basic idea behind our method is to pass a secret line through a published point. Any attacker who uses only one point cannot recover the secret line. Only the party who knows two points of the secret line can recover the line. Based on this idea, we propose new key exchange protocols and a message exchange protocol. The secret key established through the proposed method is a set of the secret points. Moreover, because the secret key is a set of secret points, it can support the dynamic part of a dynamic peer group that allows new parties to join and parties to leave the group.\",\"PeriodicalId\":376322,\"journal\":{\"name\":\"First International Symposium on Cyber Worlds, 2002. Proceedings.\",\"volume\":\"144 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2002-11-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"First International Symposium on Cyber Worlds, 2002. Proceedings.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CW.2002.1180885\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"First International Symposium on Cyber Worlds, 2002. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CW.2002.1180885","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Key exchange protocols for multiparty communication services
Network technology is improving distributed applications. The parties in distributed applications need to exchange secret information to perform a specific task, and these parties form a specific group. Secret message exchanges in the group are likely to be in a secret conference over a network. To perform secret message exchange, one needs a common secret key to encrypt or decrypt messages. The basic idea behind our method is to pass a secret line through a published point. Any attacker who uses only one point cannot recover the secret line. Only the party who knows two points of the secret line can recover the line. Based on this idea, we propose new key exchange protocols and a message exchange protocol. The secret key established through the proposed method is a set of the secret points. Moreover, because the secret key is a set of secret points, it can support the dynamic part of a dynamic peer group that allows new parties to join and parties to leave the group.