@inbook{ede69b6b1b1c4f67884f9784368f8f63,
title = "Conference key agreement from secret sharing",
abstract = "The work proposes new conference key agreement protocols based on secret sharing. We discuss roles of the dealer and recovery algorithms in the trust structure which is the necessary condition for any key establishment protocol to achieve the intended security goals. Our conference key agreement protocol tackles the problem of entity authentication in conference key agreement protocols. The entity authentication is replaced by group authentication. To start a new conference all principals have to be active and broadcast their shares. If the conference goes ahead, all principals are sure that all principals are present and alive. The paper is concluded with a discussion about possible modifications and extensions of the protocol.",
keywords = "Cryptographic Protocols, Key Agreement Protocols, Key Establishment Protocols, Shamir Secret Sharing",
author = "Li, {Chih Hung} and Josef Pieprzyk",
year = "1999",
doi = "10.1007/3-540-48970-3_6",
language = "English",
isbn = "9783540657569",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "64--76",
editor = "Josef Pieprzyk and Rei Safavi-Naini and Jennifer Seberry",
booktitle = "Information Security and Privacy",
address = "United States",
note = "4th Australasian Conference on Information Security and Privacy, ACISP - 1999 ; Conference date: 07-04-1999 Through 09-04-1999",
}