-
1
-
-
4444225744
-
On the performance of group key agreement protocols
-
Y. Amir, Y. Kim, C. Nita-Rotaru, and G. Tsudik, "On the performance of group key agreement proto-cols," ACM Transactions on Information and System Security, vol. 7, no. 3, pp. 457-488, 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.3
, pp. 457-488
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Tsudik, G.4
-
2
-
-
0346265020
-
Extending JOUX protocol to multi party key agreement
-
INDOCRYPT'03, Springer-Verlag, LNCS 2904
-
R. Barua, R. Dutta, and P. Sarkar, "Extending JOUX protocol to multi party key agreement," Ad-vances in Cryptology: INDOCRYPT'03, Springer-Verlag, LNCS 2904, pp. 205-217, 2003.
-
(2003)
Ad-vances in Cryptology
, pp. 205-217
-
-
Barua, R.1
Dutta, R.2
Sarkar, P.3
-
4
-
-
35048841300
-
Effcient selective-ID identity based encryption without random oracles
-
EUROCRYPT'04, Springer-Verlag, LNCS 3027
-
D. Boneh and X. Boyen, "Effcient selective-ID identity based encryption without random oracles," Ad-vances in Cryptology: EUROCRYPT'04, Springer-Verlag, LNCS 3027, pp. 223-238, 2004.
-
(2004)
Ad-vances in Cryptology
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
24944562007
-
Hierarchical identity based encryption with constant size cipher-text
-
EUROCRYPT'05, Springer-Verlag, LNCS 3494
-
D. Boneh, X. Boyen, and E. J. Goh, "Hierarchical identity based encryption with constant size cipher-text," Advances in Cryptology: EUROCRYPT'05, Springer-Verlag, LNCS 3494, pp. 440-456, 2005.
-
(2005)
Advances in Cryptology
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.J.3
-
6
-
-
33745166648
-
Collusion resistant broadast encryption with short ci-phrertexts and private keys
-
CRYPTO'05, Springer-Verlag, LNCS 3621
-
D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadast encryption with short ci-phrertexts and private keys," Advances in Cryptology: CRYPTO'05, Springer-Verlag, LNCS 3621, pp. 258-275, 2005.
-
(2005)
Advances in Cryptology
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
7
-
-
84948991087
-
-
Springer-Verlag, LNCS 950
-
M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system," Advances in Cryptology: Eurocrypt'94, Springer-Verlag, LNCS 950, pp. 275-286, 1995.
-
(1995)
A secure and efficient conference key distribution system, Advances in Cryptology: Eurocrypt'94
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
8
-
-
33748118047
-
Group key management protocols: A novel taxonomy
-
Y. Challal and H. Seba, "Group key management protocols: A novel taxonomy," International Journal of Information Theory, vol. 2, no. 1, pp. 105-118, 2005.
-
(2005)
International Journal of Information Theory
, vol.2
, Issue.1
, pp. 105-118
-
-
Challal, Y.1
Seba, H.2
-
9
-
-
34347393777
-
Identity-based key agreement protocols from pairings
-
L. Chen, M. Cheng, and N. P. Smart, "Identity-based key agreement protocols from pairings," In-ternational Journal of Information Security, vol. 6, no. 4, pp. 213-241, 2007.
-
(2007)
In-ternational Journal of Information Security
, vol.6
, Issue.4
, pp. 213-241
-
-
Chen, L.1
Cheng, M.2
Smart, N.P.3
-
10
-
-
0024715386
-
Secure broadcasting using the secure lock
-
G. H. Chiou and W. T. Chen, "Secure broadcasting using the secure lock," IEEE Transactions on Software Engineering, vol. 15, no. 8, pp. 929-934, 1989.
-
(1989)
IEEE Transactions on Software Engineering
, vol.15
, Issue.8
, pp. 929-934
-
-
Chiou, G.H.1
Chen, W.T.2
-
11
-
-
35048874197
-
Efficient ID-based group key agreement with bilinear maps
-
Springer-Verlag, LNCS 2947
-
K. Y. Choi, J. Y. Hwang, and D. H. Lee, "Efficient ID-based group key agreement with bilinear maps," Proceedings of Public Key Cryptography, Springer-Verlag, LNCS 2947, pp. 130-144, 2004.
-
(2004)
Proceedings of Public Key Cryptography
, pp. 130-144
-
-
Choi, K.Y.1
Hwang, J.Y.2
Lee, D.H.3
-
12
-
-
35248901924
-
Public key broadcast encryption for stateless receivers
-
DRM'02, Springer Verlag, LNCS 2696
-
Y. Dodis and N. Fazio, "Public key broadcast encryption for stateless receivers," Digital Rights Management: DRM'02, Springer Verlag, LNCS 2696, pp. 61-80, 2002.
-
(2002)
Digital Rights Management
, pp. 61-80
-
-
Dodis, Y.1
Fazio, N.2
-
13
-
-
67650659197
-
Adaptive security in broadcast encryption systems (with short cipher-texts)
-
EUROCRYPT'09, Springer-Verlag, LNCS 5479
-
C. Gentry and B. Waters, "Adaptive security in broadcast encryption systems (with short cipher-texts)," Advances in Cryptology: EUROCRYPT'09, Springer-Verlag, LNCS 5479, pp. 171-188, 2009.
-
(2009)
Advances in Cryptology
, pp. 171-188
-
-
Gentry, C.1
Waters, B.2
-
14
-
-
14844326195
-
The LSD broadcast encryption scheme
-
CRYPTO'02, Springer-Verlag, LNCS 2442
-
D. Halevy and A. Shamir, "The LSD broadcast encryption scheme," Advances in Cryptology: CRYPTO'02, Springer Verlag, LNCS 2442, pp. 145-161, 2002.
-
(2002)
Advances in Cryptology
, pp. 145-161
-
-
Halevy, D.1
Shamir, A.2
-
15
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
Springer-Verlag, LNCS 1838
-
A. Joux, "A one round protocol for tripartite Diffie-Hellman," the 4th International Symposium on Al-gorithmic Number Theory, Springer-Verlag, LNCS 1838, pp. 385-394, 2000.
-
(2000)
the 4th International Symposium on Al-gorithmic Number Theory
, pp. 385-394
-
-
Joux, A.1
-
16
-
-
68849114797
-
Security-Focused survey on group key exchange protocols
-
HGI Network and Data Security Group
-
M. Manulis, "Security-Focused survey on group key exchange protocols," Technical Report November, HGI Network and Data Security Group, 2006. (http://www.manulis.eu/papers/TR0603-GKEPS.pdf)
-
(2006)
Technical Report November
-
-
Manulis, M.1
-
17
-
-
84880852861
-
Revoca-tion and tracing schemes for stateless receivers
-
CRYPTO'01, Springer-Verlag, LNCS 2139
-
D. Naor, M. Naor, and J. B. Lotspiech, "Revoca-tion and tracing schemes for stateless receivers," Advances in Cryptology: CRYPTO'01, Springer-Verlag, LNCS 2139, pp. 41-62, 2001.
-
(2001)
Ad-vances in Cryptology
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.B.3
-
18
-
-
0034838199
-
ELK, a new protocol for efficient large-group key distribution
-
A. Perrig, D. Song, and J. D. Tygar, "ELK, a new protocol for efficient large-group key distribution," IEEE Security and Privacy Symposium, pp. 247-262, 2001.
-
(2001)
IEEE Security and Privacy Symposium
, pp. 247-262
-
-
Perrig, A.1
Song, D.2
Tygar, J.D.3
-
19
-
-
0345565893
-
A Survey of Key Man-agement for secure group communication
-
S. Rafaeli and D. Hutchison, "A Survey of Key Man-agement for secure group communication," ACM Computer Surveys, vol. 35, no. 3, pp. 309-329, 2003.
-
(2003)
ACM Computer Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
|