A conference session key distribution method used in an ID-based
cryptographic system includes selecting two different temporary secret
keys, generating a message and generating session key generation
variables using the temporary secret keys of a session initiating party.
Only valid participating parties receive the session key generation
variables. Each party determines the session shared key from the session
key generation variables.