참고문헌
- C. Chang, T. Wu and C. Chen, 'The Design of a Conference Key Distribution System' Proc. of ASIACRYPT'92, pp, 11.1-11.6, 1992 https://doi.org/10.1007/3-540-57220-1_83
- J. Sebeny and J. Pieprzyk, Cryptography: An Introduction of Computer Security. Prentice-Hall, New York, 1988
- A. Shamir 'Identity-based cryptosystems and signature schemes,' Proc. of Crypto'84, Lecture Notes in Computer Science No.196, Springer-Verlag, pp.47-53, 1985
- A. Fiat and A. Shamir, 'How to prove yourself: Practical solutions to identification and signature schemes,' Proc, of Crypto'86, Lecture Notes in Computer Science No.263, Springer- Verlag, pp.186-194, 1987
- T. Okamoto, 'Proposal for identity-based key distribution system:' Electron. Lett.. No.22, pp.1283-1284, 1986 https://doi.org/10.1049/el:19860880
- I. Ingernarsson, D. T. Tang and C. K. Wong, 'A Conference Key Distribution system,' IEEE Trans. on Info. Theory Vol.IT-28, pp.714-720, 1982 https://doi.org/10.1109/TIT.1982.1056542
- K. Koyama and K. Ohta, 'Identity-Based Conference Key Distribution System,' Proc. of Crypto'87, Lecture Notes In Computer Science, 1987
- A. Shimbo and S. Kawamura, 'Cryptoanalysis of several Conference Key Distribution Schemes,' Proc. of ASIACRYPT'91, pp.155-160, 1991
- C. Liu, 'Block Designs' in Introduction to Combinatorial Mathematics, McGraw- Hill, New York, 1968
- M. Rhee, error Correcting Coding Theory, McGraw-Hill, New York, 1989
- D. Welsh, Codes and Cryptography, Oxford Science Pub., Oxford, 1988
- J. Ryou, 'A Load Balancing Algorithm in Distributed Computing Systems,' J. of Korea Info. Sci. Soc., Vol.20, No.3, pp.430-441, 1993
- T. Lee, I. Chung, 'The Design of Authentication Mechanism Employing the Block Design for Information Security in COREA Environment,' J. Korean Inst. of Commun. Sci., Vol.24, No.3B, pp.330-337, Mar, 1999