메뉴 건너뛰기




Volumn 4939 LNCS, Issue , 2008, Pages 197-213

SAS-based group authentication and key agreement protocols

Author keywords

Groups; Key agreement; Message authentication; Multi party

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; COMPUTER PRIVACY; CONSUMER ELECTRONICS; CRYPTOGRAPHY; ELECTRONICS INDUSTRY; LAWS AND LEGISLATION; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SYNTHETIC APERTURE SONAR;

EID: 40249105903     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78440-1_12     Document Type: Conference Paper
Times cited : (20)

References (21)
  • 1
    • 84957629783 scopus 로고    scopus 로고
    • Relations Among Notions of Security for Public-Key Encryption Schemes
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations Among Notions of Security for Public-Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26-45. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure against Dictionary Attacks
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232 249. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 84957059629 scopus 로고    scopus 로고
    • Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • Bellare, M., Sahai, A.: Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 519-536. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 519-536
    • Bellare, M.1    Sahai, A.2
  • 8
    • 84948991087 scopus 로고    scopus 로고
    • Desmedt, Y., Burmester, M.: A secure and efficient conference key distribution system (extended abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, 950, pp. 275-286. Springer, Heidelberg (1995)
    • Desmedt, Y., Burmester, M.: A secure and efficient conference key distribution system (extended abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275-286. Springer, Heidelberg (1995)
  • 12
    • 84983134965 scopus 로고    scopus 로고
    • Efficient non-malleable commitment schemes
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Fischlin, M., Fischlin, R.: Efficient non-malleable commitment schemes. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 413-431. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 413-431
    • Fischlin, M.1    Fischlin, R.2
  • 13
    • 84955559079 scopus 로고    scopus 로고
    • Just, M., Vaudenay, S.: Authenticated Multi-Party Key Agreement. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, 1163, pp. 36-49. Springer, Heidelberg (1996)
    • Just, M., Vaudenay, S.: Authenticated Multi-Party Key Agreement. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 36-49. Springer, Heidelberg (1996)
  • 14
    • 84885941616 scopus 로고    scopus 로고
    • Laur, S., Nyberg, K.: Efficient Mutual Data Authentication Using Manually Authenticated Strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, 4301, pp. 90-107. Springer, Heidelberg (2006)
    • Laur, S., Nyberg, K.: Efficient Mutual Data Authentication Using Manually Authenticated Strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 90-107. Springer, Heidelberg (2006)
  • 15
    • 84943400746 scopus 로고    scopus 로고
    • General composition and universal composability in secure multi-party computation, In: FOCS
    • Los Alamitos
    • Lindell, Y.: General composition and universal composability in secure multi-party computation, In: FOCS 2003, pp. 394-403. IEEE Computer Society, Los Alamitos (2003)
    • (2003) 394-403. IEEE Computer Society , pp. 2003
    • Lindell, Y.1
  • 16
    • 35048882590 scopus 로고    scopus 로고
    • On Simulation-Sound Trapdoor Commitments
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • MacKenzie, P., Yang, K.: On Simulation-Sound Trapdoor Commitments. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004, LNCS, vol. 3027, pp. 382-400. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 382-400
    • MacKenzie, P.1    Yang, K.2
  • 17
    • 33745637238 scopus 로고    scopus 로고
    • Pasini, S., Vaudenay, S.: An Optimal Non-interactive Message Authentication Protocol. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, 3860, pp. 280-294. Springer, Heidelberg (2006)
    • Pasini, S., Vaudenay, S.: An Optimal Non-interactive Message Authentication Protocol. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 280-294. Springer, Heidelberg (2006)
  • 18
    • 33745832230 scopus 로고    scopus 로고
    • Pasini, S., Vaudenay, S.: SAS-based Authenticated Key Agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 395-409. Springer, Heidelberg (2006)
    • Pasini, S., Vaudenay, S.: SAS-based Authenticated Key Agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 395-409. Springer, Heidelberg (2006)
  • 19
    • 84876402257 scopus 로고    scopus 로고
    • Valkonen, J., Asokan, N., Nyberg, K.: Ad hoc security association for groups. In: Buttyán, L., GIigor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, 4357, pp. 150-164. Springer, Heidelberg (2006)
    • Valkonen, J., Asokan, N., Nyberg, K.: Ad hoc security association for groups. In: Buttyán, L., GIigor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 150-164. Springer, Heidelberg (2006)
  • 20
    • 33744911390 scopus 로고    scopus 로고
    • Vaudenay, S.: On Bluetooth repairing: Key agreement based on symmetric-key cryptography. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, 3822, pp. 1-9. Springer, Heidelberg (2005)
    • Vaudenay, S.: On Bluetooth repairing: Key agreement based on symmetric-key cryptography. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 1-9. Springer, Heidelberg (2005)
  • 21
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309-326. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 309-326
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.