메뉴 건너뛰기




Volumn 54, Issue 5, 2008, Pages 2007-2025

Provably secure constant round contributory group key agreement in dynamic setting

Author keywords

Decision Diffie Hellman (DDH) problem; Dynamic membership change; Group key agreement; Provable security

Indexed keywords

ALGORITHMS; AUTHENTICATION; COMPUTATIONAL COMPLEXITY; REAL TIME SYSTEMS; SECURITY OF DATA;

EID: 43749092801     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2008.920224     Document Type: Article
Times cited : (112)

References (49)
  • 1
    • 0346265020 scopus 로고    scopus 로고
    • Extending joux protocol to multi party key agreement
    • Proc. Indocrypt 2003
    • R. Barua, R. Dutta, and P. Sarkar, "Extending joux protocol to multi party key agreement," in Proc. Indocrypt 2003, 2003, vol. LNCS 2904, Lecture Notes in Computer Science, pp. 205-217.
    • (2003) Lecture Notes in Computer Science , vol.LNCS 2904 , pp. 205-217
    • Barua, R.1    Dutta, R.2    Sarkar, P.3
  • 2
    • 0032218239 scopus 로고    scopus 로고
    • Communication complexity of group key distribution
    • K. Becker and U. Wille, "Communication complexity of group key distribution," in Proc. ACM CCS 1998, 1998, pp. 1-6.
    • (1998) Proc. ACM CCS 1998 , pp. 1-6
    • Becker, K.1    Wille, U.2
  • 3
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols
    • M. Bellare, R. Canetti, and H. Krawczyk, "A modular approach to the design and analysis of authentication and key exchange protocols," in Proc. 30th Annu. Symp. Theory Comput., 1998, pp. 419-428.
    • (1998) Proc. 30th Annu. Symp. Theory Comput , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 4
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Proc. Crypto 1993
    • M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Proc. Crypto 1993, 1994, vol. LNCS 773, Lecture Notes in Computer Science, pp. 231-249.
    • (1994) Lecture Notes in Computer Science , vol.LNCS 773 , pp. 231-249
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0001940580 scopus 로고
    • Provably secure session key distribution: The three-party case
    • M. Bellare and P. Rogaway, "Provably secure session key distribution: The three-party case," in Proc. STOC 1995, 1995, pp. 57-66.
    • (1995) Proc. STOC 1995 , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 35248878662 scopus 로고    scopus 로고
    • Round-optimal contributory conference key agreement
    • Proc. PKC 2003
    • C. Boyd and J. M. G. Nieto, "Round-optimal contributory conference key agreement," in Proc. PKC 2003, 2003, vol. LNCS 2567, Lecture Notes in Computer Science, pp. 161-174.
    • (2003) Lecture Notes in Computer Science , vol.LNCS 2567 , pp. 161-174
    • Boyd, C.1    Nieto, J.M.G.2
  • 8
    • 35048875249 scopus 로고    scopus 로고
    • Constant round authenticated group key agreement via distributed computing
    • Proc. PKC 2004
    • E. Bresson and D. Catalano, "Constant round authenticated group key agreement via distributed computing," in Proc. PKC 2004, 2004, vol. LNCS 2947, Lecture Notes in Computer Science, pp. 115-129.
    • (2004) Lecture Notes in Computer Science , vol.LNCS 2947 , pp. 115-129
    • Bresson, E.1    Catalano, D.2
  • 9
    • 50849092893 scopus 로고    scopus 로고
    • Dynamic group Diffie-Hellman key exchange under standard assumptions
    • Proc. Eurocrypt 2002
    • E. Bresson, O. Chevassut, and D. Pointcheval, "Dynamic group Diffie-Hellman key exchange under standard assumptions," in Proc. Eurocrypt 2002, 2002, vol. LNCS 2332, Lecture Notes in Computer Science, pp. 321-336.
    • (2002) Lecture Notes in Computer Science , vol.LNCS 2332 , pp. 321-336
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 10
    • 50849127145 scopus 로고    scopus 로고
    • Provably authenticated group Diffie-Hellman key exchange - The dynamic case
    • E. Bresson, O. Chevassut, and D. Pointcheval, "Provably authenticated group Diffie-Hellman key exchange - The dynamic case," in Proc. Asiacrypt 2001, 2001, vol. LNCS 2248, pp. 290-309.
    • (2001) Proc. Asiacrypt 2001 , vol.LNCS 2248 , pp. 290-309
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 11
    • 4544386246 scopus 로고    scopus 로고
    • Mutual authentication and group key agreement for low-power mobile devices
    • E. Bresson, O. Chevassut, A. Essiari, and D. Pointcheval, "Mutual authentication and group key agreement for low-power mobile devices," Comput. Commun., vol. 27, no. 17, pp. 1730-1737, 2004.
    • (2004) Comput. Commun , vol.27 , Issue.17 , pp. 1730-1737
    • Bresson, E.1    Chevassut, O.2    Essiari, A.3    Pointcheval, D.4
  • 13
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution system
    • Proc. Eurocrypt 1994
    • M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system," in Proc. Eurocrypt 1994, 1995, vol. LNCS 950, Lecture Notes in Computer Science, pp. 275-286.
    • (1995) Lecture Notes in Computer Science , vol.LNCS 950 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 14
    • 84978999296 scopus 로고    scopus 로고
    • Efficient and secure conference key distribution
    • Proc. Int. Workshop on Security Protocols
    • M. Burmester and Y. Desmedt, "Efficient and secure conference key distribution," in Proc. Int. Workshop on Security Protocols, 1997, vol. LNCS 1189, Lecture Notes in Computer Science, pp. 119-130.
    • (1997) Lecture Notes in Computer Science , vol.LNCS 1189 , pp. 119-130
    • Burmester, M.1    Desmedt, Y.2
  • 15
    • 15344345559 scopus 로고    scopus 로고
    • A secure and scalable group key exchange system
    • M. Burmester and Y. Desmedt, "A secure and scalable group key exchange system," Inf. Process. Lett., vol. 94, no. 3, pp. 137-143, 2005.
    • (2005) Inf. Process. Lett , vol.94 , Issue.3 , pp. 137-143
    • Burmester, M.1    Desmedt, Y.2
  • 16
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key exchange and secure channels
    • Proc. Eurocrypt 2002
    • R. Canetti and H. Krawczyk, "Universally composable notions of key exchange and secure channels," in Proc. Eurocrypt 2002, 2002, vol. LNCS 2332, Lecture Notes in Computer Science, pp. 337-351.
    • (2002) Lecture Notes in Computer Science , vol.LNCS 2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 17
    • 35048874197 scopus 로고    scopus 로고
    • Efficient id-based group key agreement with bilinear maps
    • Proc. PKC 2004
    • K. Y. Choi, J. Y. Hwang, and D. H. Lee, "Efficient id-based group key agreement with bilinear maps," in Proc. PKC 2004, 2004, vol. LNCS 2947, Lecture Notes in Computer Science, pp. 130-144.
    • (2004) Lecture Notes in Computer Science , vol.LNCS 2947 , pp. 130-144
    • Choi, K.Y.1    Hwang, J.Y.2    Lee, D.H.3
  • 18
    • 33646779184 scopus 로고    scopus 로고
    • Errors in computational complexity proofs for protocols
    • Proc. Asiacrypt 2005
    • K.-K. Choo, C. Boyd, and Y. Hitchcock, "Errors in computational complexity proofs for protocols," in Proc. Asiacrypt 2005, 2005, vol. LNCS 3788, Lecture Notes in Computer Science, pp. 624-643.
    • (2005) Lecture Notes in Computer Science , vol.LNCS 3788 , pp. 624-643
    • Choo, K.-K.1    Boyd, C.2    Hitchcock, Y.3
  • 19
    • 38549165616 scopus 로고    scopus 로고
    • Scalable authenticated tree based group key exchange for ad-hoc groups
    • Proc. FC 2007
    • Y. Desmedt, T. Lange, and M. Burmester, "Scalable authenticated tree based group key exchange for ad-hoc groups," in Proc. FC 2007, 2007, Lecture Notes in Computer Science.
    • (2007) Lecture Notes in Computer Science
    • Desmedt, Y.1    Lange, T.2    Burmester, M.3
  • 20
    • 33750275124 scopus 로고    scopus 로고
    • A nonmalleable group key exchange protocol robust against active insiders
    • Proc. ISC 2006
    • Y. Desmedt, J. Pieprzyk, R. Steinfeld, and H. Wang, "A nonmalleable group key exchange protocol robust against active insiders," in Proc. ISC 2006, 2006, vol. LNCS 4176, Lecture Notes in Computer Science, pp. 459-475.
    • (2006) Lecture Notes in Computer Science , vol.LNCS 4176 , pp. 459-475
    • Desmedt, Y.1    Pieprzyk, J.2    Steinfeld, R.3    Wang, H.4
  • 21
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 22
    • 26444527611 scopus 로고    scopus 로고
    • Provably secure authenticated tree based group key agreement
    • Proc. ICICS 2004
    • R. Dutta, R. Barua, and P. Sarkar, "Provably secure authenticated tree based group key agreement," in Proc. ICICS 2004, 2004, vol. LNCS 3269, Lecture Notes in Computer Science, pp. 92-104.
    • (2004) Lecture Notes in Computer Science , vol.LNCS 3269 , pp. 92-104
    • Dutta, R.1    Barua, R.2    Sarkar, P.3
  • 23
    • 26444479604 scopus 로고    scopus 로고
    • Dynamic group key agreement in tree-based setting
    • Proc. ACISP 2005
    • R. Dutta and R. Barua, "Dynamic group key agreement in tree-based setting," in Proc. ACISP 2005, 2005, vol. LNCS 3574, Lecture Notes in Computer Science, pp. 101-112.
    • (2005) Lecture Notes in Computer Science , vol.LNCS 3574 , pp. 101-112
    • Dutta, R.1    Barua, R.2
  • 24
    • 33645964925 scopus 로고    scopus 로고
    • Constant round dynamic group key agreement
    • Proc. ISC 2005
    • R. Dutta and R. Barua, "Constant round dynamic group key agreement," in Proc. ISC 2005, 2005, vol. LNCS 3650, Lecture Notes in Computer Science, pp. 74-88.
    • (2005) Lecture Notes in Computer Science , vol.LNCS 3650 , pp. 74-88
    • Dutta, R.1    Barua, R.2
  • 26
    • 84958952153 scopus 로고    scopus 로고
    • An authenticated key agreement protocol secure against active attacks
    • S. Hirose and S. Yoshida, "An authenticated key agreement protocol secure against active attacks," in Proc. PKC 1998, 1998, vol. LNCS 1431, pp. 135-148.
    • (1998) Proc. PKC 1998 , vol.LNCS 1431 , pp. 135-148
    • Hirose, S.1    Yoshida, S.2
  • 28
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • Proc. ANTS 4
    • A. Joux, "A one round protocol for tripartite Diffie-Hellman," in Proc. ANTS 4, 2000, vol. LNCS 1838, Lecture Notes in Computer Science, pp. 385-394.
    • (2000) Lecture Notes in Computer Science , vol.LNCS 1838 , pp. 385-394
    • Joux, A.1
  • 29
    • 3543038203 scopus 로고    scopus 로고
    • Attacks to xu-tilborg's conference key distribution scheme
    • B. Jung, S. Paeng, and D. Kim, "Attacks to xu-tilborg's conference key distribution scheme," IEEE Commun. Lett., vol. 8, pp. 446-448, 2004.
    • (2004) IEEE Commun. Lett , vol.8 , pp. 446-448
    • Jung, B.1    Paeng, S.2    Kim, D.3
  • 30
    • 33745766832 scopus 로고    scopus 로고
    • Modeling insider attacks on group key-exchange protocols
    • J. Katz and J. Shin, "Modeling insider attacks on group key-exchange protocols," in Proc. ACM CCS 2005, 2005, pp. 180-189.
    • (2005) Proc. ACM CCS 2005 , pp. 180-189
    • Katz, J.1    Shin, J.2
  • 31
    • 35248878854 scopus 로고    scopus 로고
    • Scalable protocols for authenticated group key exchange
    • Proc. Crypto 2003
    • J. Katz and M. Yung, "Scalable protocols for authenticated group key exchange," in Proc. Crypto 2003, 2003, vol. LNCS 2729, Lecture Notes in Computer Science, pp. 110-125.
    • (2003) Lecture Notes in Computer Science , vol.LNCS 2729 , pp. 110-125
    • Katz, J.1    Yung, M.2
  • 32
    • 0034449805 scopus 로고    scopus 로고
    • Simple and fault-tolerant key agreement for dynamic collaborative groups
    • Y. Kim, A. Perrig and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in Proc. ACM CCS 2000 2000, pp. 235-244.
    • (2000) Proc. ACM CCS 2000 , pp. 235-244
    • Kim, Y.1    Perrig, A.2    Tsudik, G.3
  • 35
    • 35048821512 scopus 로고    scopus 로고
    • Constant-round authenticated group key exchange for dynamic groups
    • Proc Asiacrypt 2004
    • H. J. Kim, S. M. Lee, and D. H. Lee, "Constant-round authenticated group key exchange for dynamic groups," in Proc Asiacrypt 2004, 2004, vol. LNCS 3329, Lecture Notes in Computer Science, pp. 245-259.
    • (2004) Lecture Notes in Computer Science , vol.LNCS 3329 , pp. 245-259
    • Kim, H.J.1    Lee, S.M.2    Lee, D.H.3
  • 36
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: A high-performance secure, Diffie-Hellman protocol
    • Proc. Crypto 2005
    • H. Krawczyk, "HMQV: A high-performance secure, Diffie-Hellman protocol," in Proc. Crypto 2005, 2005, vol. LNCS 3621, Lecture Notes in Computer Science, pp. 546-566.
    • (2005) Lecture Notes in Computer Science , vol.LNCS 3621 , pp. 546-566
    • Krawczyk, H.1
  • 37
    • 0242309146 scopus 로고    scopus 로고
    • An efficient tree-based group key agreement using bilinear map
    • Proc. ACNS 2003
    • S. Lee, Y. Kim, K. Kim, and D. Ryu, "An efficient tree-based group key agreement using bilinear map," in Proc. ACNS 2003, 2003, vol. LNCS 2846, Lecture Notes in Computer Science, pp. 357-371.
    • (2003) Lecture Notes in Computer Science , vol.LNCS 2846 , pp. 357-371
    • Lee, S.1    Kim, Y.2    Kim, K.3    Ryu, D.4
  • 38
    • 0033280698 scopus 로고    scopus 로고
    • Secure protocol transformation via expansion: From two-party to groups
    • M. Mayer and M. Yung, "Secure protocol transformation via expansion: From two-party to groups," in Proc. ACM CCS 1999, 1999, pp. 83-92.
    • (1999) Proc. ACM CCS 1999 , pp. 83-92
    • Mayer, M.1    Yung, M.2
  • 39
    • 19744369256 scopus 로고    scopus 로고
    • Ddh-based group key agreement for mobile computing
    • J. Nam, J. Lee, S. Kim, and D. Won, "Ddh-based group key agreement for mobile computing," J. Syst. Software, vol. 78, no. 1, pp. 73-83, 2005.
    • (2005) J. Syst. Software , vol.78 , Issue.1 , pp. 73-83
    • Nam, J.1    Lee, J.2    Kim, S.3    Won, D.4
  • 43
    • 38049062481 scopus 로고    scopus 로고
    • Constant-round authenticated group key exchange with logarithmic computation complexity
    • Proc. ACNS 2007
    • J. Nam, J. Paik, U.-M. Kim, and D. Won, "Constant-round authenticated group key exchange with logarithmic computation complexity," in Proc. ACNS 2007, 2007, vol. LNCS 4521, Lecture Notes in Computer Science, pp. 158-176.
    • (2007) Lecture Notes in Computer Science , vol.LNCS 4521 , pp. 158-176
    • Nam, J.1    Paik, J.2    Kim, U.-M.3    Won, D.4
  • 44
    • 43749096207 scopus 로고    scopus 로고
    • Malleability attacks on multi-party key agreement protocols
    • J. Pieprzyk and H. Wang, "Malleability attacks on multi-party key agreement protocols," Coding, Cryptogr. Combin., vol. 23, pp. 277-288, 2004.
    • (2004) Coding, Cryptogr. Combin , vol.23 , pp. 277-288
    • Pieprzyk, J.1    Wang, H.2
  • 45
    • 23944520338 scopus 로고    scopus 로고
    • Efficient authenticated key agreement protocol for dynamic groups
    • Proc. WISA 2004
    • K. Ren, H. Lee, K. Kim, and T. Yoo, "Efficient authenticated key agreement protocol for dynamic groups," in Proc. WISA 2004, 2004, vol. LNCS 3325, Lecture Notes in Computer Science, pp. 144-159.
    • (2004) Lecture Notes in Computer Science , vol.LNCS 3325 , pp. 144-159
    • Ren, K.1    Lee, H.2    Kim, K.3    Yoo, T.4
  • 46
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • A. Sherman and D. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Trans. Software Eng., vol. 29, no. 5, pp. 444-458, 2003.
    • (2003) IEEE Trans. Software Eng , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.1    McGrew, D.2
  • 48
    • 0029720059 scopus 로고    scopus 로고
    • Diffie-Hellman key distribution extended to group communication
    • M. Steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman key distribution extended to group communication," in Proc. ACM CCS 1996, 1996, pp. 31-37.
    • (1996) Proc. ACM CCS 1996 , pp. 31-37
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.