Skip to main content
Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
  1. Home
  2. Journal of Cryptology
  3. Article

A matrix key-distribution scheme

  • Published: February 1990
  • Volume 2, pages 51–59, (1990)
  • Cite this article
Download PDF
Journal of Cryptology Aims and scope Submit manuscript
A matrix key-distribution scheme
Download PDF
  • Li Gong1 &
  • David J. Wheeler1 
  • 510 Accesses

  • 75 Citations

  • 6 Altmetric

  • Explore all metrics

Abstract

A new key-distribution scheme is presented. It is based on the distinctive idea that lets each node have a set of keys of which it shares a distinct subset with every other node. This has the advantage that the numbers of keys that must be generated is proportional to the number of nodes. Moreover, two nodes can start a session with virtually no delay. The scheme suits an environment where there is a certain level of trust among the insiders. The security property to an outsider remains identical to that of other existing schemes. Two versions of the scheme are given. Analysis of security and performance shows it is a practical solution to some key-distribution problems.

Article PDF

Download to read the full article text

Similar content being viewed by others

A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication

Article 27 May 2022

A Survey on Path Key Establishment

Chapter © 2024

Privacy Protection Routing and a Self-organized Key Management Scheme in Opportunistic Networks

Chapter © 2020

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Crime Control and Security
  • Matrix Theory
  • Principles and Models of Security
  • Security Services
  • Seed distribution
  • Blockchain
Use our pre-submission checklist

Avoid common mistakes on your manuscript.

References

  1. R. Blom, An Optimal Class of Symmetric Key Generation Systems,Advances in Cryptology: Proceedings of Eurocrypt 84, Lecture Notes in Computer Science, vol. 209, Springer-Verlag, Berlin, 1984, pp. 335–338.

    Google Scholar 

  2. W. Diffie and M. E. Hellman, New Directions in Cryptography,IEEE Transactions on Information Theory, vol. 22, no. 6, December 1976, pp. 644–654.

    Article  Google Scholar 

  3. T. Matsumto and H. Imai, On the Key Predistribution System: A Practical Solutions to the Key Distribution Problem,Advances in Cryptology: Proceedings of Crypto 87, Lecture Notes in Computer Science, vol. 293, Springer-Verlag, Berlin, 1987, pp. 185–193.

    Google Scholar 

  4. S. M. Matyas and C. H. Meyer, Generation, Distribution, and Installation of Cryptography Keys,IBM Systems Journal, vol. 17, no. 2, 1978, pp. 126–137.

    Google Scholar 

  5. R. M. Needham and M. D. Schroeder, Using Encryption for Authentication in Large Networks of Computers,Communications of the ACM, vol. 21, no. 12, December 1978, pp. 993–999.

    Article  Google Scholar 

  6. V. L. Voydock and S. T. Kent, Security Mechanisms in High-Level Network Protocols,ACM Computing Surveys, vol. 15, no. 2, 1983, pp. 135–171.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Computer Laboratory, University of Cambridge, CB2 3QG, Cambridge, England

    Li Gong & David J. Wheeler

Authors
  1. Li Gong
    View author publications

    Search author on:PubMed Google Scholar

  2. David J. Wheeler
    View author publications

    Search author on:PubMed Google Scholar

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, G., Wheeler, D.J. A matrix key-distribution scheme. J. Cryptology 2, 51–59 (1990). https://doi.org/10.1007/BF02252869

Download citation

  • Received: 31 March 1988

  • Revised: 17 August 1989

  • Issue date: February 1990

  • DOI: https://doi.org/10.1007/BF02252869

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Key words

  • Communication security
  • Private-key cipher
  • Session key
  • Key distribution
Use our pre-submission checklist

Avoid common mistakes on your manuscript.

Advertisement

Coming soon

We're working on ways to enable issue downloads.

Go to issue

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

18.217.30.93

Not affiliated

Springer Nature

© 2025 Springer Nature