메뉴 건너뛰기




Volumn 78, Issue 1, 2005, Pages 73-83

DDH-based group key agreement in a mobile environment

Author keywords

DDH assumption; Group key agreement; Mobile device; Multicast

Indexed keywords

COMPUTATIONAL METHODS; MULTICASTING; NETWORK PROTOCOLS; PERSONAL DIGITAL ASSISTANTS; PROGRAM COMPILERS; SECURITY OF DATA; SECURITY SYSTEMS; USER INTERFACES;

EID: 19744369256     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2004.10.024     Document Type: Article
Times cited : (56)

References (41)
  • 4
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Eurocrypt'00
    • Bellare, M., Pointcheval, D., Rogaway, P., 2000. Authenticated key exchange secure against dictionary attacks. In: Eurocrypt'00, Lecture Notes in Computer Science 1807, pp. 139-155
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 0342790359 scopus 로고
    • Digital library services in mobile computing
    • B. Bhargava, M. Annamalai, and E. Pitoura Digital library services in mobile computing ACM SIGMOD Record 24 4 1995 34 39
    • (1995) ACM SIGMOD Record , vol.24 , Issue.4 , pp. 34-39
    • Bhargava, B.1    Annamalai, M.2    Pitoura, E.3
  • 8
    • 35248878662 scopus 로고    scopus 로고
    • Round-optimal contributory conference key agreement
    • Proceedings of 6th International Workshop on Practice and Theory in Public Key Cryptography (PKC'03)
    • Boyd, C., Nieto, J.M.G., 2003. Round-optimal contributory conference key agreement. In: Proceedings of 6th International Workshop on Practice and Theory in Public Key Cryptography (PKC'03), Lecture Notes in Computer Science, 2567, pp. 161-174
    • (2003) Lecture Notes in Computer Science , vol.2567 , pp. 161-174
    • Boyd, C.1    Nieto, J.M.G.2
  • 9
    • 35048875249 scopus 로고    scopus 로고
    • Constant round authenticated group key agreement via distributed computation
    • Proceedings of 7th International Workshop on Practice and Theory in Public Key Cryptography (PKC'04)
    • Bresson, E., Catalano, D., 2004. Constant round authenticated group key agreement via distributed computation. In: Proceedings of 7th International Workshop on Practice and Theory in Public Key Cryptography (PKC'04), Lecture Notes in Computer Science 2947, pp. 115-129
    • (2004) Lecture Notes in Computer Science , vol.2947 , pp. 115-129
    • Bresson, E.1    Catalano, D.2
  • 11
    • 50849127145 scopus 로고    scopus 로고
    • Provably authenticated group Diffie-Hellman key exchange-the dynamic case
    • Asiacrypt'01
    • Bresson, E., Chevassut, O., Pointcheval, D., 2001a. Provably authenticated group Diffie-Hellman key exchange-the dynamic case. In: Asiacrypt'01, Lecture Notes in Computer Science, 2248, pp. 290-309
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 290-309
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 12
    • 50849092893 scopus 로고    scopus 로고
    • Dynamic group Diffie-Hellman key exchange under standard assumptions
    • Eurocrypt'02
    • Bresson, E., Chevassut, O., Pointcheval, D., 2002a. Dynamic group Diffie-Hellman key exchange under standard assumptions. In: Eurocrypt'02, Lecture Notes in Computer Science, 2332, pp. 321-336
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 321-336
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 13
    • 84958755223 scopus 로고    scopus 로고
    • Group diffie-hellman key exchange secure against dictionary attacks
    • Asiacrypt'02
    • Bresson, E., Chevassut, O., Pointcheval, D., 2002b. Group Diffie-Hellman key exchange secure against dictionary attacks. In: Asiacrypt'02, Lecture Notes in Computer Science, 2501, pp. 497-514
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 497-514
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 15
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution system
    • Eurocrypt'94
    • Burmester, M., Desmedt, Y., 1994. A secure and efficient conference key distribution system. In: Eurocrypt'94, Lecture Notes in Computer Science, 950, pp. 275-286
    • (1994) Lecture Notes in Computer Science , vol.950 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 16
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Eurocrypt'01
    • Canetti, R., Krawczyk, H., 2001. Analysis of key-exchange protocols and their use for building secure channels. In: Eurocrypt'01, Lecture Notes in Computer Science, 2045, pp. 453-474
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 19
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Transactions on Information Theory 31 4 1985 469 472
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 21
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. Rivest A digital signature scheme secure against adaptive chosen-message attacks SIAM Journal of Computing 17 2 1988 281 308
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 22
    • 0036505541 scopus 로고    scopus 로고
    • Authentication protocols for mobile network environment value-added services
    • G. Horn, K.M. Martin, and C.J. Mitchell Authentication protocols for mobile network environment value-added services IEEE Transactions on Vehicular Technology 51 2 2002 383 392
    • (2002) IEEE Transactions on Vehicular Technology , vol.51 , Issue.2 , pp. 383-392
    • Horn, G.1    Martin, K.M.2    Mitchell, C.J.3
  • 25
    • 84955559079 scopus 로고    scopus 로고
    • Authenticated multi-party key agreement
    • Asiacrypt'96
    • Just, M., Vaudenay, S., 1996. Authenticated multi-party key agreement. In: Asiacrypt'96, Lecture Notes in Computer Science, 1163, pp. 36-49
    • (1996) Lecture Notes in Computer Science , vol.1163 , pp. 36-49
    • Just, M.1    Vaudenay, S.2
  • 26
    • 35248878854 scopus 로고    scopus 로고
    • Scalable protocols for authenticated group key exchange
    • Crypto'03
    • Katz, J., Yung, M., 2003. Scalable protocols for authenticated group key exchange. In: Crypto'03, Lecture Notes in Computer Science, 2729, pp. 110-125
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 110-125
    • Katz, J.1    Yung, M.2
  • 29
    • 0242636600 scopus 로고    scopus 로고
    • Real-time broadcast algorithm for mobile computing
    • S.-H. Lim, and J.-H. Kim Real-time broadcast algorithm for mobile computing The Journal of Systems and Software 69 2 2004 173 181
    • (2004) The Journal of Systems and Software , vol.69 , Issue.2 , pp. 173-181
    • Lim, S.-H.1    Kim, J.-H.2
  • 31
    • 19744365500 scopus 로고    scopus 로고
    • Attacks on Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices
    • Report 2004/251
    • Nam, J., Kim, S., Won, D., Attacks on Bresson-Chevassut-Essiari- Pointcheval's group key agreement scheme for low-power mobile devices. In: Cryptology ePrint Archive, Report 2004/251
    • Cryptology EPrint Archive
    • Nam, J.1    Kim, S.2    Won, D.3
  • 34
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir How to share a secret Communications of the ACM 22 11 1979 612 613
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 37
    • 84937394156 scopus 로고    scopus 로고
    • Round-efficient conference key agreement protocols with provable security
    • Asiacrypt'00
    • Tzeng, W.-G., Tzeng, Z.-J., 2000. Round-efficient conference key agreement protocols with provable security. In: Asiacrypt'00, Lecture Notes in Computer Science 1976, pp. 614-627
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 614-627
    • Tzeng, W.-G.1    Tzeng, Z.-J.2
  • 40
    • 1842478681 scopus 로고    scopus 로고
    • Password-based user authentication and key distribution protocols for client-server applications
    • H.-T. Yeh, and H.-M. Sun Password-based user authentication and key distribution protocols for client-server applications The Journal of Systems and Software 72 1 2004 97 103
    • (2004) The Journal of Systems and Software , vol.72 , Issue.1 , pp. 97-103
    • Yeh, H.-T.1    Sun, H.-M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.