Abstract
A number of alternative encryption techniques have been suggested for secure audio teleconferencing implementable on public switched network, in which the centralized facility, called bridge, does not hold any secret. The role of the bridge is to synchronously add simultaneous encrypted signals, modulo some known number, and then transmit the result to all the participants. Each terminal has a secret key, with which it can decrypt the above modular sum of encrypted signals to obtain the desired ordinary sum of cleartext signals. Secrecy of the systems is analyzed. Some of which are provably secure, assuming the existence of one way functions, and for the others we have partial cryptanalysis.
We also present a N-party identification and signature systems, based on Fiat and Shamir’s single party systems, and another N-party signature system based on discrete-log problem. Our system have communication complexity 2N times that of the basic Fiat-Shamir systems (as compared to a factor of N 2 in the direct application of the basic scheme to all pairs).
Chapter PDF
Similar content being viewed by others
References
E. Brickell and Y. Yacobi, “On Privacy Homomorphisms”, Eurocrypt-87
D. Chaum, J. van de Graaf: “An Improved Protocol for Demonstrating Possession of a Discrete Logarithm and Some Generalizations”, Eurocrypt-87
A. Fiat and A. Shamir:“How to prove yourself: Practical Solutions to Identification and Signature Problems”, to appear in Proc. Crypto-86.
O. Goldreich, S. Goldwasser and S. Micali: “How to Construct Random Functions”, JACM, Vol.33, No.4, Oct. 1986, pp.792–807.
K. Koyama and K. Ohta:“Identity based conference key distribution systems”, to appear in Crypto-87.
Rivest, Adleman and Dertouzos:“ On data banks and privacy homomorphisms”, in Foundations of secure computation, edited by Demillo et al. Academic Press 1978.
A.C. Yao, “Theory and Applications of Trapdoor Functions”, Proc. Foundations of Computer Science, 1982, pp.80–91.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1988 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Brickell, E.F., Lee, P.J., Yacobi, Y. (1988). Secure Audio Teleconference. In: Pomerance, C. (eds) Advances in Cryptology — CRYPTO ’87. CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48184-2_36
Download citation
DOI: https://doi.org/10.1007/3-540-48184-2_36
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-18796-7
Online ISBN: 978-3-540-48184-3
eBook Packages: Springer Book Archive