{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:48:19Z","timestamp":1772556499378,"version":"3.50.1"},"reference-count":18,"publisher":"Wiley","issue":"9","license":[{"start":{"date-parts":[[2007,9,5]],"date-time":"2007-09-05T00:00:00Z","timestamp":1188950400000},"content-version":"vor","delay-in-days":6821,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Systems &amp;amp; Computers in Japan"],"published-print":{"date-parts":[[1989,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Cryptographic key distribution is one of the important problems when a conventional cipher is used for secret communications. Key distribution methods can be categorized as those using a conventional cipher system and those using a public key system. In key distribution methods using a conventional cipher system, the key encryption key should be sent secretly by manual operation. In key distribution methods using a public key system, no manual operation is necessary. This paper proposes a key distribution method (mechanism) which has the same functions as key distribution methods using a public key system. The proposed method is called a double encryption key distribution method and uses modular exponential computation in <jats:italic>GF(p)<\/jats:italic>, where <jats:italic>p<\/jats:italic> is a prime. The authentication scheme for the key distribution method is shown. The advantages of the proposed key distribution method are as follows. Functions, performance and security are almost equal to main key distribution methods using a public key system. Additionally, since each node can generate and delete the encryption and decryption keys for the modular exponential function in each key distribution, it is unnecessary for each node to keep the keys.<\/jats:p>","DOI":"10.1002\/scj.4690200909","type":"journal-article","created":{"date-parts":[[2009,11,19]],"date-time":"2009-11-19T22:41:10Z","timestamp":1258670470000},"page":"89-99","source":"Crossref","is-referenced-by-count":1,"title":["A Cryptographic Key Distribution Mechanism Using Double Encryption for Secret Communications"],"prefix":"10.1002","volume":"20","author":[{"given":"Tetsuji","family":"Kobayashi","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,9,6]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"crossref","unstructured":"L.Adleman.A subexponential algorithm for the discrete logarithm problem with application to cryptography. Proc. 20th FOCS pp.55\u201360(1979).","DOI":"10.1109\/SFCS.1979.2"},{"key":"e_1_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF01840433"},{"key":"e_1_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.1987.5390134"},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_2_1_6_2","volume-title":"A study on data protection and cryptography","author":"Hitotumatsu S.","year":"1983"},{"key":"e_1_2_1_7_2","unstructured":"T.Kobayashi Cryptographic key distribution methods in distributed systems. Papers of Technical Group on Information Networks. I.E.C.E. Japan IN86\u201359 pp.31\u201336(1986)."},{"key":"e_1_2_1_8_2","unstructured":"T.Kobayashi Cryptographic key distribution methods using double encryption. Proceedings of the Conference of IPSJ 2N\u20135 (March1987)."},{"key":"e_1_2_1_9_2","unstructured":"T.Kobayashi Cryptographic key distribution method using a double encryption mechanism. Proceedings of Workshop on Cryptography and Information Security WCIS87\u201313 pp.153\u2013160(July1987)."},{"issue":"12","key":"e_1_2_1_10_2","first-page":"2722","article-title":"A three\u2010layer hybrid key distribution scheme for communications using cryptography","volume":"70","author":"Kobayashi T.","year":"1987","journal-title":"Trans. I.E.I.C.E."},{"key":"e_1_2_1_11_2","volume-title":"Cryptography: A Primer","author":"Konheim A. G.","year":"1981"},{"key":"e_1_2_1_12_2","first-page":"99","article-title":"On seeking smart public\u2010key\u2010distribution systems","volume":"69","author":"Matsumoto T.","year":"1986","journal-title":"Trans. I.E.C.E."},{"key":"e_1_2_1_13_2","unstructured":"S.Miyaguchi Conventional ciphers\u2014\u2010 DES and FEAL. Lectures for information network security and its application. I.E.C.E. pp.16\u201323(Jan.1988)."},{"key":"e_1_2_1_14_2","unstructured":"S.Miyaguchi An Extension of a Fast Data Encipherment Algorithm. The 10th Symposium on Information Theory and Its Application pp.19\u201321(Nov.1987)."},{"key":"e_1_2_1_15_2","volume-title":"Cryptography: A New Dimension in Computer Data Security","author":"Meyer C. H.","year":"1982"},{"key":"e_1_2_1_16_2","unstructured":"E.OkamotoandK.Nakamura.A study on public key distribution system. Proceedings of the Conference of I.E.C.E. No. 15 (Nov.1984)."},{"key":"e_1_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055817"},{"key":"e_1_2_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_1_19_2","unstructured":"T.YamamotoandR.Akiyama.A data encryption device incorporating fast PKDS. Proc. GLOBCOM 32.2.1\u201332.2.6 (Nov.1983)."}],"container-title":["Systems and Computers in Japan"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fscj.4690200909","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/scj.4690200909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,22]],"date-time":"2023-10-22T13:03:38Z","timestamp":1697979818000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/scj.4690200909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1989,1]]},"references-count":18,"journal-issue":{"issue":"9","published-print":{"date-parts":[[1989,1]]}},"alternative-id":["10.1002\/scj.4690200909"],"URL":"https:\/\/doi.org\/10.1002\/scj.4690200909","archive":["Portico"],"relation":{},"ISSN":["0882-1666","1520-684X"],"issn-type":[{"value":"0882-1666","type":"print"},{"value":"1520-684X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1989,1]]}}}