메뉴 건너뛰기




Volumn 6, Issue 4, 2007, Pages 243-254

Secure group key establishment revisited

Author keywords

Group key establishment; Malicious insiders; Provable security

Indexed keywords

COMPUTER PRIVACY; DATA STRUCTURES; NETWORK PROTOCOLS; TECHNICAL PRESENTATIONS;

EID: 34347395009     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-007-0018-x     Document Type: Article
Times cited : (63)

References (26)
  • 1
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols
    • In: ACM
    • Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proceedings of STOC 98, pp. 419-428. ACM (1998)
    • (1998) Proceedings of STOC 98 , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 5
    • 34347373428 scopus 로고    scopus 로고
    • Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security
    • At the time of writing available electronically at
    • Bohli, J.-M., González Vasco, M.I., Steinwandt, R.: Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security. Cryptology ePrint Archive: Report 2005/360 (2005). At the time of writing available electronically at http://www.eprint.iacr.org/2005/360
    • (2005) Cryptology EPrint Archive: Report 2005/360
    • Bohli, J.-M.1    González Vasco, M.I.2    Steinwandt, R.3
  • 7
    • 35248878662 scopus 로고    scopus 로고
    • Round-optimal contributory conference key agreement
    • In: Desmedt, Y. (eds) Springer, Berlin
    • Boyd C. and Nieto J.M.G. (2003). Round-optimal contributory conference key agreement. In: Desmedt, Y. (eds) Proceedings of PKC 2003, pp 161-174. Springer, Berlin
    • (2003) Proceedings of PKC 2003 , pp. 161-174
    • Boyd, C.1    Nieto, J.M.G.2
  • 12
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • In: Pfitzmann B. (eds). Springer, Berlin
    • Canetti R., Krawczyk H. (2001) Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann B. (eds). Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Computer Science, vol. 2045. Springer, Berlin, pp. 453-474
    • (2001) Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Computer Science , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 13
    • 33646841393 scopus 로고    scopus 로고
    • Pairing-Based One-Round Tripartite Key Agreement Protocols
    • At the time of writing available electronically at
    • Cheng, Z., Vasiu, L., Comley, R.: Pairing-Based One-Round Tripartite Key Agreement Protocols. Cryptology ePrint Archive: Report 2004/079. At the time of writing available electronically at http://www.eprint.iacr.org/ 2004/079 (2004)
    • (2004) Cryptology EPrint Archive: Report 2004/079
    • Cheng, Z.1    Vasiu, L.2    Comley, R.3
  • 18
    • 34347370803 scopus 로고    scopus 로고
    • Modeling insider attacks on group key-exchange protocols
    • At the time of writing available electronically at Full version of [19]
    • Katz, J., Shin, J.S.: Modeling insider attacks on group key-exchange protocols. Cryptology ePrint Archive: Report 2005/163. At the time of writing available electronically at http://www.eprint.iacr.org/2006/163. Full version of [19](2005)
    • (2005) Cryptology EPrint Archive: Report 2005/163
    • Katz, J.1    Shin, J.S.2
  • 20
    • 35248878854 scopus 로고    scopus 로고
    • Scalable protocols for authenticated group key exchange
    • In: Boneh D. (eds). Springer, Berlin
    • Katz J., Yung M. (2003) Scalable protocols for authenticated group key exchange. In: Boneh D. (eds). Advances in Cryptology - CRYPTO'03, Lecture Notes in Computer Science, vol. 2729. Springer, Berlin, pp. 110-125
    • (2003) Advances in Cryptology - CRYPTO'03, Lecture Notes in Computer Science , vol.2729 , pp. 110-125
    • Katz, J.1    Yung, M.2
  • 22
    • 50849127145 scopus 로고    scopus 로고
    • Provably authenticated group Diffie-Hellman key exchange-the dynamic case
    • In: Boyd, C. (eds) Springer, Berlin
    • Bresson E., Chevassut O. and Pointcheval D. (2001). Provably authenticated group Diffie-Hellman key exchange-the dynamic case. In: Boyd, C. (eds) Advances in Cryptology - ASIACRYPT 2001, pp 290-309. Springer, Berlin
    • (2001) Advances in Cryptology - ASIACRYPT 2001 , pp. 290-309
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 24
    • 0004023090 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • At the time of writing available electronically at
    • Shoup, V.: On formal models for secure key exchange. Cryptology ePrint archive: Report 1999/012 (1999). At the time of writing available electronically at http://www.eprint. iacr.org/1999/012
    • (1999) Cryptology EPrint Archive: Report 1999/012
    • Shoup, V.1
  • 25
    • 0344996490 scopus 로고    scopus 로고
    • Secure group key agreement
    • Ph.D. thesis, Universität des Saarlandes At the time of writing available at
    • Steiner, M.: Secure group key agreement. Ph.D. thesis, Universität des Saarlandes (2002). At the time of writing available at http:// www.semper.org/sirene/publ/Stei_02.thesis-final.pdf
    • (2002)
    • Steiner, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.