Conference key agreement from secret sharing

Chih Hung Li, Josef Pieprzyk

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

42 Citations (Scopus)


The work proposes new conference key agreement protocols based on secret sharing. We discuss roles of the dealer and recovery algorithms in the trust structure which is the necessary condition for any key establishment protocol to achieve the intended security goals. Our conference key agreement protocol tackles the problem of entity authentication in conference key agreement protocols. The entity authentication is replaced by group authentication. To start a new conference all principals have to be active and broadcast their shares. If the conference goes ahead, all principals are sure that all principals are present and alive. The paper is concluded with a discussion about possible modifications and extensions of the protocol.

Original languageEnglish
Title of host publicationInformation Security and Privacy
Subtitle of host publication4th Australasian Conference, ACISP’99 Wollongong, NSW, Australia, April 7–9, 1999 Proceedings
EditorsJosef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Number of pages13
ISBN (Electronic)9783540489702
ISBN (Print)9783540657569
Publication statusPublished - 1999
Externally publishedYes
Event4th Australasian Conference on Information Security and Privacy, ACISP - 1999 - Wollongong, Australia
Duration: 7 Apr 19999 Apr 1999

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)03029743
ISSN (Electronic)16113349


Other4th Australasian Conference on Information Security and Privacy, ACISP - 1999


  • Cryptographic Protocols
  • Key Agreement Protocols
  • Key Establishment Protocols
  • Shamir Secret Sharing


Dive into the research topics of 'Conference key agreement from secret sharing'. Together they form a unique fingerprint.

Cite this