-
1
-
-
0346265020
-
Extending joux protocol to multi party key agreement
-
Proc. Indocrypt 2003
-
R. Barua, R. Dutta, and P. Sarkar, "Extending joux protocol to multi party key agreement," in Proc. Indocrypt 2003, 2003, vol. LNCS 2904, Lecture Notes in Computer Science, pp. 205-217.
-
(2003)
Lecture Notes in Computer Science
, vol.LNCS 2904
, pp. 205-217
-
-
Barua, R.1
Dutta, R.2
Sarkar, P.3
-
2
-
-
0032218239
-
Communication complexity of group key distribution
-
K. Becker and U. Wille, "Communication complexity of group key distribution," in Proc. ACM CCS 1998, 1998, pp. 1-6.
-
(1998)
Proc. ACM CCS 1998
, pp. 1-6
-
-
Becker, K.1
Wille, U.2
-
3
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
M. Bellare, R. Canetti, and H. Krawczyk, "A modular approach to the design and analysis of authentication and key exchange protocols," in Proc. 30th Annu. Symp. Theory Comput., 1998, pp. 419-428.
-
(1998)
Proc. 30th Annu. Symp. Theory Comput
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
84945119254
-
Entity authentication and key distribution
-
Proc. Crypto 1993
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Proc. Crypto 1993, 1994, vol. LNCS 773, Lecture Notes in Computer Science, pp. 231-249.
-
(1994)
Lecture Notes in Computer Science
, vol.LNCS 773
, pp. 231-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0001940580
-
Provably secure session key distribution: The three-party case
-
M. Bellare and P. Rogaway, "Provably secure session key distribution: The three-party case," in Proc. STOC 1995, 1995, pp. 57-66.
-
(1995)
Proc. STOC 1995
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84949230533
-
Key agreement protocols and their security analysis
-
S. Blake-Wilson, D. Johnson, and A. Menezes, "Key agreement protocols and their security analysis," in Proc. Sixth IMA Int. Conf. Cryptogr. Coding, 1997, vol. LNCS 1355, pp. 30-45.
-
(1997)
Proc. Sixth IMA Int. Conf. Cryptogr. Coding
, vol.LNCS
, Issue.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
7
-
-
35248878662
-
Round-optimal contributory conference key agreement
-
Proc. PKC 2003
-
C. Boyd and J. M. G. Nieto, "Round-optimal contributory conference key agreement," in Proc. PKC 2003, 2003, vol. LNCS 2567, Lecture Notes in Computer Science, pp. 161-174.
-
(2003)
Lecture Notes in Computer Science
, vol.LNCS 2567
, pp. 161-174
-
-
Boyd, C.1
Nieto, J.M.G.2
-
8
-
-
35048875249
-
Constant round authenticated group key agreement via distributed computing
-
Proc. PKC 2004
-
E. Bresson and D. Catalano, "Constant round authenticated group key agreement via distributed computing," in Proc. PKC 2004, 2004, vol. LNCS 2947, Lecture Notes in Computer Science, pp. 115-129.
-
(2004)
Lecture Notes in Computer Science
, vol.LNCS 2947
, pp. 115-129
-
-
Bresson, E.1
Catalano, D.2
-
9
-
-
50849092893
-
Dynamic group Diffie-Hellman key exchange under standard assumptions
-
Proc. Eurocrypt 2002
-
E. Bresson, O. Chevassut, and D. Pointcheval, "Dynamic group Diffie-Hellman key exchange under standard assumptions," in Proc. Eurocrypt 2002, 2002, vol. LNCS 2332, Lecture Notes in Computer Science, pp. 321-336.
-
(2002)
Lecture Notes in Computer Science
, vol.LNCS 2332
, pp. 321-336
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
10
-
-
50849127145
-
Provably authenticated group Diffie-Hellman key exchange - The dynamic case
-
E. Bresson, O. Chevassut, and D. Pointcheval, "Provably authenticated group Diffie-Hellman key exchange - The dynamic case," in Proc. Asiacrypt 2001, 2001, vol. LNCS 2248, pp. 290-309.
-
(2001)
Proc. Asiacrypt 2001
, vol.LNCS 2248
, pp. 290-309
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
11
-
-
4544386246
-
Mutual authentication and group key agreement for low-power mobile devices
-
E. Bresson, O. Chevassut, A. Essiari, and D. Pointcheval, "Mutual authentication and group key agreement for low-power mobile devices," Comput. Commun., vol. 27, no. 17, pp. 1730-1737, 2004.
-
(2004)
Comput. Commun
, vol.27
, Issue.17
, pp. 1730-1737
-
-
Bresson, E.1
Chevassut, O.2
Essiari, A.3
Pointcheval, D.4
-
12
-
-
0035751060
-
Provably authenticated group Diffie-Hellman key exchange
-
E. Bresson, O. Chevassut, D. Pointcheval, and J. J. Quisquater, "Provably authenticated group Diffie-Hellman key exchange," in Proc. ACM CCS 2001, 2001, pp. 255-264.
-
(2001)
Proc. ACM CCS 2001
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.J.4
-
13
-
-
84948991087
-
A secure and efficient conference key distribution system
-
Proc. Eurocrypt 1994
-
M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system," in Proc. Eurocrypt 1994, 1995, vol. LNCS 950, Lecture Notes in Computer Science, pp. 275-286.
-
(1995)
Lecture Notes in Computer Science
, vol.LNCS 950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
14
-
-
84978999296
-
Efficient and secure conference key distribution
-
Proc. Int. Workshop on Security Protocols
-
M. Burmester and Y. Desmedt, "Efficient and secure conference key distribution," in Proc. Int. Workshop on Security Protocols, 1997, vol. LNCS 1189, Lecture Notes in Computer Science, pp. 119-130.
-
(1997)
Lecture Notes in Computer Science
, vol.LNCS 1189
, pp. 119-130
-
-
Burmester, M.1
Desmedt, Y.2
-
15
-
-
15344345559
-
A secure and scalable group key exchange system
-
M. Burmester and Y. Desmedt, "A secure and scalable group key exchange system," Inf. Process. Lett., vol. 94, no. 3, pp. 137-143, 2005.
-
(2005)
Inf. Process. Lett
, vol.94
, Issue.3
, pp. 137-143
-
-
Burmester, M.1
Desmedt, Y.2
-
16
-
-
84947232363
-
Universally composable notions of key exchange and secure channels
-
Proc. Eurocrypt 2002
-
R. Canetti and H. Krawczyk, "Universally composable notions of key exchange and secure channels," in Proc. Eurocrypt 2002, 2002, vol. LNCS 2332, Lecture Notes in Computer Science, pp. 337-351.
-
(2002)
Lecture Notes in Computer Science
, vol.LNCS 2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
17
-
-
35048874197
-
Efficient id-based group key agreement with bilinear maps
-
Proc. PKC 2004
-
K. Y. Choi, J. Y. Hwang, and D. H. Lee, "Efficient id-based group key agreement with bilinear maps," in Proc. PKC 2004, 2004, vol. LNCS 2947, Lecture Notes in Computer Science, pp. 130-144.
-
(2004)
Lecture Notes in Computer Science
, vol.LNCS 2947
, pp. 130-144
-
-
Choi, K.Y.1
Hwang, J.Y.2
Lee, D.H.3
-
18
-
-
33646779184
-
Errors in computational complexity proofs for protocols
-
Proc. Asiacrypt 2005
-
K.-K. Choo, C. Boyd, and Y. Hitchcock, "Errors in computational complexity proofs for protocols," in Proc. Asiacrypt 2005, 2005, vol. LNCS 3788, Lecture Notes in Computer Science, pp. 624-643.
-
(2005)
Lecture Notes in Computer Science
, vol.LNCS 3788
, pp. 624-643
-
-
Choo, K.-K.1
Boyd, C.2
Hitchcock, Y.3
-
19
-
-
38549165616
-
Scalable authenticated tree based group key exchange for ad-hoc groups
-
Proc. FC 2007
-
Y. Desmedt, T. Lange, and M. Burmester, "Scalable authenticated tree based group key exchange for ad-hoc groups," in Proc. FC 2007, 2007, Lecture Notes in Computer Science.
-
(2007)
Lecture Notes in Computer Science
-
-
Desmedt, Y.1
Lange, T.2
Burmester, M.3
-
20
-
-
33750275124
-
A nonmalleable group key exchange protocol robust against active insiders
-
Proc. ISC 2006
-
Y. Desmedt, J. Pieprzyk, R. Steinfeld, and H. Wang, "A nonmalleable group key exchange protocol robust against active insiders," in Proc. ISC 2006, 2006, vol. LNCS 4176, Lecture Notes in Computer Science, pp. 459-475.
-
(2006)
Lecture Notes in Computer Science
, vol.LNCS 4176
, pp. 459-475
-
-
Desmedt, Y.1
Pieprzyk, J.2
Steinfeld, R.3
Wang, H.4
-
21
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
22
-
-
26444527611
-
Provably secure authenticated tree based group key agreement
-
Proc. ICICS 2004
-
R. Dutta, R. Barua, and P. Sarkar, "Provably secure authenticated tree based group key agreement," in Proc. ICICS 2004, 2004, vol. LNCS 3269, Lecture Notes in Computer Science, pp. 92-104.
-
(2004)
Lecture Notes in Computer Science
, vol.LNCS 3269
, pp. 92-104
-
-
Dutta, R.1
Barua, R.2
Sarkar, P.3
-
23
-
-
26444479604
-
Dynamic group key agreement in tree-based setting
-
Proc. ACISP 2005
-
R. Dutta and R. Barua, "Dynamic group key agreement in tree-based setting," in Proc. ACISP 2005, 2005, vol. LNCS 3574, Lecture Notes in Computer Science, pp. 101-112.
-
(2005)
Lecture Notes in Computer Science
, vol.LNCS 3574
, pp. 101-112
-
-
Dutta, R.1
Barua, R.2
-
24
-
-
33645964925
-
Constant round dynamic group key agreement
-
Proc. ISC 2005
-
R. Dutta and R. Barua, "Constant round dynamic group key agreement," in Proc. ISC 2005, 2005, vol. LNCS 3650, Lecture Notes in Computer Science, pp. 74-88.
-
(2005)
Lecture Notes in Computer Science
, vol.LNCS 3650
, pp. 74-88
-
-
Dutta, R.1
Barua, R.2
-
26
-
-
84958952153
-
An authenticated key agreement protocol secure against active attacks
-
S. Hirose and S. Yoshida, "An authenticated key agreement protocol secure against active attacks," in Proc. PKC 1998, 1998, vol. LNCS 1431, pp. 135-148.
-
(1998)
Proc. PKC 1998
, vol.LNCS 1431
, pp. 135-148
-
-
Hirose, S.1
Yoshida, S.2
-
27
-
-
0020180459
-
A conference key distribution system
-
I. Ingemarsson, D. Tang, and C. Wong, "A conference key distribution system," IEEE Trans. Inf. Theory, vol. 28, pp. 714-720, 1982.
-
(1982)
IEEE Trans. Inf. Theory
, vol.28
, pp. 714-720
-
-
Ingemarsson, I.1
Tang, D.2
Wong, C.3
-
28
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
Proc. ANTS 4
-
A. Joux, "A one round protocol for tripartite Diffie-Hellman," in Proc. ANTS 4, 2000, vol. LNCS 1838, Lecture Notes in Computer Science, pp. 385-394.
-
(2000)
Lecture Notes in Computer Science
, vol.LNCS 1838
, pp. 385-394
-
-
Joux, A.1
-
29
-
-
3543038203
-
Attacks to xu-tilborg's conference key distribution scheme
-
B. Jung, S. Paeng, and D. Kim, "Attacks to xu-tilborg's conference key distribution scheme," IEEE Commun. Lett., vol. 8, pp. 446-448, 2004.
-
(2004)
IEEE Commun. Lett
, vol.8
, pp. 446-448
-
-
Jung, B.1
Paeng, S.2
Kim, D.3
-
30
-
-
33745766832
-
Modeling insider attacks on group key-exchange protocols
-
J. Katz and J. Shin, "Modeling insider attacks on group key-exchange protocols," in Proc. ACM CCS 2005, 2005, pp. 180-189.
-
(2005)
Proc. ACM CCS 2005
, pp. 180-189
-
-
Katz, J.1
Shin, J.2
-
31
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
Proc. Crypto 2003
-
J. Katz and M. Yung, "Scalable protocols for authenticated group key exchange," in Proc. Crypto 2003, 2003, vol. LNCS 2729, Lecture Notes in Computer Science, pp. 110-125.
-
(2003)
Lecture Notes in Computer Science
, vol.LNCS 2729
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
32
-
-
0034449805
-
Simple and fault-tolerant key agreement for dynamic collaborative groups
-
Y. Kim, A. Perrig and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in Proc. ACM CCS 2000 2000, pp. 235-244.
-
(2000)
Proc. ACM CCS 2000
, pp. 235-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
33
-
-
3142512728
-
Tree based group key agreement
-
Y. Kim, A. Perrig, and G. Tsudik, "Tree based group key agreement," ACM Trans. Inf. Syst. Security, vol. 7, no. 1, pp. 60-96, 2004.
-
(2004)
ACM Trans. Inf. Syst. Security
, vol.7
, Issue.1
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
34
-
-
84904254536
-
Communication-efficient group key agreement
-
Y. Kim, A. Perrig, and G. Tsudik, "Communication-efficient group key agreement," in Proc. 17th Int. Inf. Security Conf., IFIP Section MMI 2001, pp. 229-244.
-
(2001)
Proc. 17th Int. Inf. Security Conf., IFIP Section MMI
, pp. 229-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
35
-
-
35048821512
-
Constant-round authenticated group key exchange for dynamic groups
-
Proc Asiacrypt 2004
-
H. J. Kim, S. M. Lee, and D. H. Lee, "Constant-round authenticated group key exchange for dynamic groups," in Proc Asiacrypt 2004, 2004, vol. LNCS 3329, Lecture Notes in Computer Science, pp. 245-259.
-
(2004)
Lecture Notes in Computer Science
, vol.LNCS 3329
, pp. 245-259
-
-
Kim, H.J.1
Lee, S.M.2
Lee, D.H.3
-
36
-
-
33745179557
-
HMQV: A high-performance secure, Diffie-Hellman protocol
-
Proc. Crypto 2005
-
H. Krawczyk, "HMQV: A high-performance secure, Diffie-Hellman protocol," in Proc. Crypto 2005, 2005, vol. LNCS 3621, Lecture Notes in Computer Science, pp. 546-566.
-
(2005)
Lecture Notes in Computer Science
, vol.LNCS 3621
, pp. 546-566
-
-
Krawczyk, H.1
-
37
-
-
0242309146
-
An efficient tree-based group key agreement using bilinear map
-
Proc. ACNS 2003
-
S. Lee, Y. Kim, K. Kim, and D. Ryu, "An efficient tree-based group key agreement using bilinear map," in Proc. ACNS 2003, 2003, vol. LNCS 2846, Lecture Notes in Computer Science, pp. 357-371.
-
(2003)
Lecture Notes in Computer Science
, vol.LNCS 2846
, pp. 357-371
-
-
Lee, S.1
Kim, Y.2
Kim, K.3
Ryu, D.4
-
38
-
-
0033280698
-
Secure protocol transformation via expansion: From two-party to groups
-
M. Mayer and M. Yung, "Secure protocol transformation via expansion: From two-party to groups," in Proc. ACM CCS 1999, 1999, pp. 83-92.
-
(1999)
Proc. ACM CCS 1999
, pp. 83-92
-
-
Mayer, M.1
Yung, M.2
-
39
-
-
19744369256
-
Ddh-based group key agreement for mobile computing
-
J. Nam, J. Lee, S. Kim, and D. Won, "Ddh-based group key agreement for mobile computing," J. Syst. Software, vol. 78, no. 1, pp. 73-83, 2005.
-
(2005)
J. Syst. Software
, vol.78
, Issue.1
, pp. 73-83
-
-
Nam, J.1
Lee, J.2
Kim, S.3
Won, D.4
-
43
-
-
38049062481
-
Constant-round authenticated group key exchange with logarithmic computation complexity
-
Proc. ACNS 2007
-
J. Nam, J. Paik, U.-M. Kim, and D. Won, "Constant-round authenticated group key exchange with logarithmic computation complexity," in Proc. ACNS 2007, 2007, vol. LNCS 4521, Lecture Notes in Computer Science, pp. 158-176.
-
(2007)
Lecture Notes in Computer Science
, vol.LNCS 4521
, pp. 158-176
-
-
Nam, J.1
Paik, J.2
Kim, U.-M.3
Won, D.4
-
44
-
-
43749096207
-
Malleability attacks on multi-party key agreement protocols
-
J. Pieprzyk and H. Wang, "Malleability attacks on multi-party key agreement protocols," Coding, Cryptogr. Combin., vol. 23, pp. 277-288, 2004.
-
(2004)
Coding, Cryptogr. Combin
, vol.23
, pp. 277-288
-
-
Pieprzyk, J.1
Wang, H.2
-
45
-
-
23944520338
-
Efficient authenticated key agreement protocol for dynamic groups
-
Proc. WISA 2004
-
K. Ren, H. Lee, K. Kim, and T. Yoo, "Efficient authenticated key agreement protocol for dynamic groups," in Proc. WISA 2004, 2004, vol. LNCS 3325, Lecture Notes in Computer Science, pp. 144-159.
-
(2004)
Lecture Notes in Computer Science
, vol.LNCS 3325
, pp. 144-159
-
-
Ren, K.1
Lee, H.2
Kim, K.3
Yoo, T.4
-
46
-
-
0038043478
-
Key establishment in large dynamic groups using one-way function trees
-
A. Sherman and D. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Trans. Software Eng., vol. 29, no. 5, pp. 444-458, 2003.
-
(2003)
IEEE Trans. Software Eng
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.1
McGrew, D.2
-
48
-
-
0029720059
-
Diffie-Hellman key distribution extended to group communication
-
M. Steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman key distribution extended to group communication," in Proc. ACM CCS 1996, 1996, pp. 31-37.
-
(1996)
Proc. ACM CCS 1996
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
49
-
-
0031629148
-
Cliques: A new approach to group key agreement
-
May
-
M. Steiner, G. Tsudik, and M. Waidner, "Cliques: A new approach to group key agreement," in Proc. IEEE Conf. Distrib. Comput. Syst., May 1998, pp. 380-380.
-
(1998)
Proc. IEEE Conf. Distrib. Comput. Syst
, pp. 380-380
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
|