메뉴 건너뛰기




Volumn 4610 LNCS, Issue , 2007, Pages 395-409

Malicious participants in group key exchange: Key control and contributiveness in the shadow of trust

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY;

EID: 38049011067     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73547-2_41     Document Type: Conference Paper
Times cited : (24)

References (28)
  • 1
    • 0032218234 scopus 로고    scopus 로고
    • Ateniese, G., Steiner, M., Tsudik, G.: Authenticated Group Key Agreement and Friends. ACMCCS, 17-26 (1998)
    • Ateniese, G., Steiner, M., Tsudik, G.: Authenticated Group Key Agreement and Friends. ACMCCS, 17-26 (1998)
  • 2
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: CRYPTO, pp. 232-249 (1993)
    • (1993) CRYPTO , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 0001940580 scopus 로고
    • Provably Secure Session Key Distribution: The Three Party Case
    • Bellare, M., Rogaway, P.: Provably Secure Session Key Distribution: The Three Party Case. STOC, 57-66 (1995)
    • (1995) STOC , vol.57-66
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 35048875249 scopus 로고    scopus 로고
    • Bresson, E., Catalano, D.: Constant Round Authenticated Group Key Agreement via Distributed Computation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, 2947, pp. 115-129. Springer, Heidelberg (2004)
    • Bresson, E., Catalano, D.: Constant Round Authenticated Group Key Agreement via Distributed Computation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 115-129. Springer, Heidelberg (2004)
  • 7
    • 50849092893 scopus 로고    scopus 로고
    • Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
    • Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 321-336. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 321-336
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 10
    • 85013976350 scopus 로고
    • On the Risk of Opening Distributed Keys
    • Burmester, M.: On the Risk of Opening Distributed Keys. In: CRYPTO, pp. 308-317 (1994)
    • (1994) CRYPTO , pp. 308-317
    • Burmester, M.1
  • 12
    • 33646805409 scopus 로고    scopus 로고
    • Examining Indistinguishability- Based Proof Models for Key Establishment Protocols
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Choo, K.K.R., Boyd, C., Hitchcock, Y.: Examining Indistinguishability- Based Proof Models for Key Establishment Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 585-604. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 585-604
    • Choo, K.K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 13
    • 0017018484 scopus 로고
    • New Directions in Cryptography
    • Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE IT 22(6), 644-654 (1976)
    • (1976) IEEE IT , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 14
    • 1542593353 scopus 로고    scopus 로고
    • Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and Authenticated Key Exchanges. DCC 2(2), 107-125 (1992)
    • Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and Authenticated Key Exchanges. DCC 2(2), 107-125 (1992)
  • 16
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
    • Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM Journal of Computing 17(2), 281-308 (1988)
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 17
    • 84969368443 scopus 로고    scopus 로고
    • Günther, C.G.: An Identity-Based Key-Exchange Protocol. In: EUROCRYPT, pp. 29-37 (1989)
    • Günther, C.G.: An Identity-Based Key-Exchange Protocol. In: EUROCRYPT, pp. 29-37 (1989)
  • 18
    • 33745766832 scopus 로고    scopus 로고
    • Modeling Insider Attacks on Group Key-Exchange Protocols
    • Katz, J., Shin, J.S.: Modeling Insider Attacks on Group Key-Exchange Protocols. ACM CCS, 180-189 (2005)
    • (2005) ACM CCS , pp. 180-189
    • Katz, J.1    Shin, J.S.2
  • 19
    • 35248878854 scopus 로고    scopus 로고
    • Scalable Protocols for Authenticated Group Key Exchange
    • Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: CRYPTO, pp. 110-125 (2003)
    • (2003) CRYPTO , pp. 110-125
    • Katz, J.1    Yung, M.2
  • 20
    • 0034449805 scopus 로고    scopus 로고
    • Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups
    • Kim, Y., Perrig, A., Tsudik, G.: Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. ACM CCS, 235-244 (2000)
    • (2000) ACM CCS , pp. 235-244
    • Kim, Y.1    Perrig, A.2    Tsudik, G.3
  • 21
    • 33745179557 scopus 로고    scopus 로고
    • Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 546-566. Springer, Heidelberg (2005)
    • Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
  • 22
    • 67849088015 scopus 로고    scopus 로고
    • Survey on Security Requirements and Models for Group Key Exchange. Technical Report
    • Manulis, M.: Survey on Security Requirements and Models for Group Key Exchange. Technical Report, http://eprint.iacr.org/2006/388
    • Manulis, M.1
  • 23
    • 68849114797 scopus 로고    scopus 로고
    • Security-Focused Survey on Group Key Exchange Protocols. Technical Report
    • Manulis, M.: Security-Focused Survey on Group Key Exchange Protocols. Technical Report. http://eprint.iacr.org/2006/395
    • Manulis, M.1
  • 25
    • 0032069870 scopus 로고    scopus 로고
    • Key Control in Key Agreement Protocols
    • Mitchell, C.J., Ward, M., Wilson, P.: Key Control in Key Agreement Protocols. El. Letters 34(10), 980-981 (1998)
    • (1998) El. Letters , vol.34 , Issue.10 , pp. 980-981
    • Mitchell, C.J.1    Ward, M.2    Wilson, P.3
  • 26
    • 0004023090 scopus 로고    scopus 로고
    • On Formal Models for Secure Key Exchange (Version 4)
    • Technical Report
    • Shoup, V.: On Formal Models for Secure Key Exchange (Version 4). Technical Report. http://shoup.net/
    • Shoup, V.1
  • 28
    • 85032878997 scopus 로고
    • On Key Distribution Systems
    • Yacobi, Y., Shmuely, Z.: On Key Distribution Systems. In: CRYPTO, pp. 344-355 (1989)
    • (1989) CRYPTO , pp. 344-355
    • Yacobi, Y.1    Shmuely, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.