메뉴 건너뛰기




Volumn 2567, Issue , 2003, Pages 161-174

Round-optimal contributory conference key agreement

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 35248878662     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36288-6_12     Document Type: Article
Times cited : (131)

References (24)
  • 2
  • 5
    • 84948957152 scopus 로고    scopus 로고
    • Public-key encryption in a multi-user setting: Security proofs and improvements
    • B. Preneel, editor, Advances in Cryptology - Eurocrypt 2000, Springer-Verlag, Full version
    • Mihir Bellare, Alexandra Boldyreva, and Silvio Micali. Public-key encryption in a multi-user setting: Security proofs and improvements. In B. Preneel, editor, Advances in Cryptology - Eurocrypt 2000, volume 1807 of LNCS. Springer-Verlag, 2000. Full version at http://www-cse.ucsd.edu/users/mihir/papers/ key-distribution.html.
    • (2000) LNCS , vol.1807
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 6
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Springer-Verlag
    • Mihir Bellare, David Pointcheval, and Phillip Rogaway. Authenticated key exchange secure against dictionary attacks. In Advances in Cryptology - Eurocrypt 2000, pages 139-155. Springer-Verlag, 2000.
    • (2000) Advances in Cryptology - Eurocrypt 2000 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 7
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Springer-Verlag, Full version
    • Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In Advances in Cryptology - CRYPTO'93, pages 232-249. Springer-Verlag, 1993. Full version at www-cse.ucsd.edu/users/mihir.
    • (1993) Advances in Cryptology - CRYPTO'93 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 33645422534 scopus 로고    scopus 로고
    • Security proofs for entity authentication and authenticated key transport protocols employing asymmetric techniques
    • Springer-Verlag
    • S. Blake-Wilson and A. Menezes. Security proofs for entity authentication and authenticated key transport protocols employing asymmetric techniques. In Security Protocols Workshop. Springer-Verlag, 1997.
    • (1997) Security Protocols Workshop
    • Blake-Wilson, S.1    Menezes, A.2
  • 9
    • 84949221411 scopus 로고    scopus 로고
    • Authenticated Diffie-Hellman key agreement protocols
    • Springer-Verlag
    • Simon Blake-Wilson and Alfred Menezes. Authenticated Diffie-Hellman key agreement protocols. In Selected Areas in Cryptography, pages 339-361. Springer-Verlag, 1999.
    • (1999) Selected Areas in Cryptography , pp. 339-361
    • Blake-Wilson, S.1    Menezes, A.2
  • 10
    • 3042657129 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Diffie-Hellman
    • Springer-Verlag
    • Victor Boyko, Philip MacKenzie, and Sarvar Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In Advanced in Cryptology - Eurocrypt 2000. Springer-Verlag, 2000.
    • (2000) Advanced in Cryptology - Eurocrypt 2000
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 11
    • 50849127145 scopus 로고    scopus 로고
    • Provably authenticated group Diffie-Hellman key exchange - The dynamic case
    • Springer-Verlag
    • Emmanuel Bresson, Olivier Chevassut, and David Pointcheval. Provably authenticated group Diffie-Hellman key exchange - the dynamic case. In Advances in Cryptology - Asiacrypt 2001, pages 290-309. Springer-Verlag, 2001.
    • (2001) Advances in Cryptology - Asiacrypt 2001 , pp. 290-309
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 13
    • 0035751060 scopus 로고    scopus 로고
    • Provably authenticated group Diffie-Hellman key exchange
    • ACM Press, November
    • Emmanuel Bresson, Olivier Chevassut, David Pointcheval, and Jean-Jacques Quisquater. Provably authenticated group Diffie-Hellman key exchange. In CCS'01, pages 255-264. ACM Press, November 2001.
    • (2001) CCS'01 , pp. 255-264
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3    Quisquater, J.-J.4
  • 14
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution system
    • Springer-Verlag
    • Mike Burmester and Yvo Desmedt. A secure and efficient conference key distribution system. In Advances in Cryptology - Eurocrypt'94, pages 275-286. Springer-Verlag, 1995.
    • (1995) Advances in Cryptology - Eurocrypt'94 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 17
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Shafi Goldwasser, Silvio Micali, and Ronald Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput., 17(2), 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 19
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • W. Bosma, editor, Algorithmic Number Theory, 4th International Symposium, ANTS-IV, Springer-Verlag
    • Antoine Joux. A one round protocol for tripartite Diffie-Hellman. In W. Bosma, editor, Algorithmic Number Theory, 4th International Symposium, ANTS-IV, volume 1838 of LNCS, pages 385-393. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1838 , pp. 385-393
    • Joux, A.1
  • 21
    • 0034822650 scopus 로고    scopus 로고
    • A security analysis of the Cliques protocol suites
    • IEEE Computer Society Press
    • Olivier Pereira and Jean-Jacques Quisquater. A security analysis of the Cliques protocol suites. In Computer Security Foundations Workshop, pages 73-81. IEEE Computer Society Press, 2001.
    • (2001) Computer Security Foundations Workshop , pp. 73-81
    • Pereira, O.1    Quisquater, J.-J.2
  • 22
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Joan Feigenbaum, editor, Advances in Cryptology - CRYPTO '91, Springer-Verlag, Berlin, Germany
    • Charles Rackoff and Daniel R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Joan Feigenbaum, editor, Advances in Cryptology - CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 433-444. Springer-Verlag, Berlin, Germany, 1992.
    • (1992) Lecture Notes in Computer Science , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 24
    • 84937394156 scopus 로고    scopus 로고
    • Round-efficient conference key agreement protocols with provable security
    • T. Okamoto, editor, Advances in Cryptology - Asiacrypt 2000, Springer-Verlag
    • Wen-Guey Tzeng and Zhi-Jha Tzeng. Round-efficient conference key agreement protocols with provable security. In T. Okamoto, editor, Advances in Cryptology - Asiacrypt 2000, volume 1976 of LNCS, pages 614-627. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1976 , pp. 614-627
    • Tzeng, W.-G.1    Tzeng, Z.-J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.