About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
1st International Conference on Collaborative Computing: Networking, Applications and Worksharing

Research Article

Secure and efficient key distribution for collaborative applications

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/COLCOM.2005.1651220,
        author={Fuwen Liu and Hartmut Koenig},
        title={Secure and efficient key distribution for collaborative applications},
        proceedings={1st International Conference on Collaborative Computing: Networking, Applications and Worksharing},
        publisher={IEEE},
        proceedings_a={COLLABORATECOM},
        year={2006},
        month={7},
        keywords={Authentication  Business communication  Collaboration  Cryptography  Delay  Internet  Mobile communication  Peer to peer computing  Protocols  Videoconference},
        doi={10.1109/COLCOM.2005.1651220}
    }
    
  • Fuwen Liu
    Hartmut Koenig
    Year: 2006
    Secure and efficient key distribution for collaborative applications
    COLLABORATECOM
    IEEE
    DOI: 10.1109/COLCOM.2005.1651220
Fuwen Liu1,*, Hartmut Koenig1,*
  • 1: Brandenburg University of Technology Cottbus, Department of Computer Science, PF 10 13 44, 03013 Cottbus, Germany
*Contact email: lfw@informatik.tu-cottbus.de, koenig@informatik.tu-cottbus.de

Abstract

Confidentiality is a key demand for many collaborative applications in the Internet, e.g. business meetings. In a more and more mobile society there is an increasing need of spontaneous meetings in ad hoc environments, often with changing partners. To assure confidentiality of such meetings the partners have to agree upon a common secret key for encrypting their communication. While centralized collaborative systems provide practicable solutions for this, it still represents a challenging task in decentralized systems using the peer-to-peer paradigm. In this paper we present a simple key distribution protocol, called VTKD, which was especially designed for small dynamic peer groups. It consists of two parts: a mutual authentication of the partners and a secure key renewal. The protocol uses a virtual token to determine the partner responsible for the key generation and distribution procedure. VTKD fulfills the relevant demands concerning group key exchange and is more efficient related to key renewal delay than existing key exchange protocols.

Keywords
Authentication Business communication Collaboration Cryptography Delay Internet Mobile communication Peer to peer computing Protocols Videoconference
Published
2006-07-24
Publisher
IEEE
Modified
2011-11-05
http://dx.doi.org/10.1109/COLCOM.2005.1651220
Copyright © 2005–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL