skip to main content
10.1145/225058.225084acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Provably secure session key distribution: the three party case

Authors Info & Claims
Published:29 May 1995Publication History
First page image

References

  1. 1.A. BEIMEL AND B. CHOR, "Interaction in key distrib-ution schemes," Crypto 93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.M. BELLARE AND P. ROGAWAY, "Entity authentica-tion and key distribution," Crypto 93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.R. BIRD, I. GOPAL, A. HERZBERG, P. JAIW+ON, S. KUTTEN, R. MOLVA AND M. YUNG, "Systematic de-sign oft we-part y aut bent ication protocols," Crypt 091.Google ScholarGoogle Scholar
  4. 4.R. BIRD, 1. GOPAL, A. HERZBERG, P. JANSON, S. KUTTEN, R, MOLVA AND M. YUNG, "The Kryp-toKnight family of light-weight protocols for authenti-cation and key distribution," IEEE/ACM T. on Net-working, 3(1), February 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.R BLOM, "An optimal class of symmetric key genera-tion systems," Eurocrypt 84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.C BLWNDO, A. DE SANTIS, A. HERZBERG, S. KUT-TEN AND M. YUNG, "Perfectly-secure key distribution for dynamic conferences," Crypto 92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.M. BURROWS, M. ABADI AND R. NEEDHAM, "A logic for authentication," ACM Transactions on computer systems, Vol. 8, No. 1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.D. DENNING AND G. SACCO, "Timestamps in key distribution protocols," Communications of the ACM, Vol. 24, No. 8, pp. 533-536, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.W. DIFFIE AND M. E. HELLMANI "New directions in cryptography," IEEE Bans. Info. Theory IT-22, 644- 654 (November 1976).Google ScholarGoogle Scholar
  10. 10.W. DIFFIE, P. VAN 00RSCHOT AND M. WIENER, "Au-thentication and authenticated key exchanges," De-signs, ~odes and Cryptography, 2, 107-125 (1992). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.O. GOLDREICH, S. GOLDWASSER AND S. MICALI, "How to construct random functions," Journal of the ACM, vol. 33, No. 4, 210-217, (1986). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.S. GOLDWASSER AND S. MICALI, "Probabilistic en-cryption," Journal of Computer and System Sciences Vol. 28, 270-299 (April 1984).Google ScholarGoogle ScholarCross RefCross Ref
  13. 13.S. GOLDWiMSER, S. MICALI AND R. RIVEST, '{A digi-tal signature scheme secure against adaptive chosen-message at tacks," SIAM Jourrss.1 of Computing, Vol. 17, No. 2, 281-308, April 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.J. HkTAD, R. IMPAGLIAZZO, L. LEVIN, AND M. LUBY, "Construction of a pseudo-random gener-ator from any one-way function." Manuscript. Earlier versions in STOC 89, STOC 90.Google ScholarGoogle Scholar
  15. 15.R. IMPA~LIAZZO AND M. LUBY, "One-way func-tions are essential for complexity based cryptography," FOCS 89. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.T. LEIGHTON AND S. MICALI, "Secret-key agreement without public-key cryptography," Crypto 93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.R. NEEDHAM AND M. SCHROEDER, "Using encryp-tion for authentication in large networks of comput-ers," Communications of the ACM, Vol. 21, No. 12, 993-999, December 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.R. NEEDHAM AND M. SCHROEDER, "Authentication revisited," Operating Systems Review, Vol. 21, No. 1, p. 7, January 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.A. SHAMIR, "Identity-based cryptosystems and signa-ture schemes," Crypto 91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20.J. STEINER, C. NEWMAN AND J. SCHILLER, "Ker-beros: an authentication service for open network sys-t ems," Proceedings of the USEiVIX Winter Conference, pp. 191-202, 1988Google ScholarGoogle Scholar
  21. 21.Y. YACOBI AND Z, SHMUELY. "On key distribution sys-tems." Crypto 89. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Provably secure session key distribution: the three party case

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          STOC '95: Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
          May 1995
          776 pages
          ISBN:0897917189
          DOI:10.1145/225058

          Copyright © 1995 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 29 May 1995

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate1,469of4,586submissions,32%

          Upcoming Conference

          STOC '24
          56th Annual ACM Symposium on Theory of Computing (STOC 2024)
          June 24 - 28, 2024
          Vancouver , BC , Canada

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader