Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10340629 | Computer Standards & Interfaces | 2005 | 6 Pages |
Abstract
In 2003, Yang et al. presented a conference key distribution system that was intended to provide user anonymity. Subsequently, Lin et al. pointed out a security flaw in Yang et al.'s scheme based on solving linear equations and proposed a modified scheme. Accordingly, the current paper reviews the schemes proposed by Yang et al. and Lin et al., highlights the weakness in both schemes, and then proposes a new conference key agreement scheme with user anonymity.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Woo-Hun Kim, Eun-Kyung Ryu, Jae-Yuel Im, Kee-Young Yoo,