Summary: | 碩士 === 國立交通大學 === 資訊科學系 === 88 === When some members want to hold a conference via an open Internet, there may have passive attackers eavesdropping the communication. Therefore, all participants should establish a common conference key to encrypt the entire communication session during the conference.
Futhermore, when the participants execute the conference key agreement protocol, some malicious participants may not follow the protocol and try to cheat the honest participants to compute the different conference keys. So how to make sure that the honest participants get a common conference key is one of the major concerns.
Besides these, the efficiency of the protocol is also very important. Thus, we proposed three round-efficient conference agreement protocols. No matter how many malicious participants there are, the honest participants will get a common conference key.
|