메뉴 건너뛰기




Volumn 28, Issue 5, 2012, Pages 829-857

Scalable group key exchange for securing distributed operating systems

Author keywords

Binary tree; Distributed operating system; Group key exchange; Security; Session key

Indexed keywords

ACTIVE ADVERSARY; AUTHENTICATION TECHNIQUES; COMMUNICATION MODELS; COMPLETE BINARY TREE; COMPUTING NODES; DISTRIBUTED OPERATING SYSTEMS; GROUP KEY EXCHANGE; INSECURE NETWORKS; LOGARITHMIC COMPUTATION; POTENTIAL ATTACK; PROTECTING GROUP; PROVABLE SECURITY; ROUND COMPLEXITY; SECURE MULTICASTS; SECURITY; SESSION KEY;

EID: 84865417403     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (2)

References (32)
  • 4
    • 33646779184 scopus 로고    scopus 로고
    • Errors in computational complexity proofs for protocols
    • LNCS
    • K. K. Choo, C. Boyd, and Y. Hitchcock, "Errors in computational complexity proofs for protocols," in Proceedings of Asiacrypt, LNCS 3788, 2005, pp. 624-643.
    • (2005) Proceedings of Asiacrypt , vol.3788 , pp. 624-643
    • Choo, K.K.1    Boyd, C.2    Hitchcock, Y.3
  • 5
    • 33846893853 scopus 로고    scopus 로고
    • Scalable protocols for authenticated group key exchange
    • J. Katz and M. Yung, "Scalable protocols for authenticated group key exchange," Journal of Cryptology, Vol. 20, 2007, pp. 265-294.
    • (2007) Journal of Cryptology , vol.20 , pp. 265-294
    • Katz, J.1    Yung, M.2
  • 6
    • 43749092801 scopus 로고    scopus 로고
    • Provably secure costant round contributory group key agreement in dynamic setting
    • R. Dutta and R. Barua, "Provably secure costant round contributory group key agreement in dynamic setting," IEEE Transactions on Information Theory, Vol. 54, 2008, pp. 2007-2025.
    • (2008) IEEE Transactions on Information Theory , vol.54 , pp. 2007-2025
    • Dutta, R.1    Barua, R.2
  • 7
    • 55949109421 scopus 로고    scopus 로고
    • An improved identity-based key agreement protocol and its security proof
    • S. Wang, Z. Cao, K. K. Choo, and L. Wang, "An improved identity-based key agreement protocol and its security proof," Information Sciences, Vol. 179, 2009, pp. 307- 318.
    • (2009) Information Sciences , vol.179 , pp. 307-318
    • Wang, S.1    Cao, Z.2    Choo, K.K.3    Wang, L.4
  • 8
    • 79958112453 scopus 로고    scopus 로고
    • A secure ID-based authenticated group key exchange protocol resistant to insider attacks
    • T. Wu, Y. Tseng, and C. Yu, "A secure ID-based authenticated group key exchange protocol resistant to insider attacks," Journal of Information Science and Engineering, Vol. 27, 2011, pp. 915-932.
    • (2011) Journal of Information Science and Engineering , vol.27 , pp. 915-932
    • Wu, T.1    Tseng, Y.2    Yu, C.3
  • 9
    • 35048821512 scopus 로고    scopus 로고
    • Constant-round authenticated group key exchange for dynamic groups
    • LNCS
    • H. Kim, S. Lee, and D. Lee, "Constant-round authenticated group key exchange for dynamic groups," in Proceedings of Asiacrypt, LNCS 3329, 2004, pp. 245-259.
    • (2004) Proceedings of Asiacrypt , vol.3329 , pp. 245-259
    • Kim, H.1    Lee, S.2    Lee, D.3
  • 12
    • 3543038203 scopus 로고    scopus 로고
    • Attacks to Xu-Tilborg's conference key distribution scheme
    • B. Jung, S. Paeng, and D. Kim, "Attacks to Xu-Tilborg's conference key distribution scheme," IEEE Communications Letters, Vol. 8, 2004, pp. 446-448.
    • (2004) IEEE Communications Letters , vol.8 , pp. 446-448
    • Jung, B.1    Paeng, S.2    Kim, D.3
  • 13
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution system
    • LNCS
    • M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system," in Proceedings of Eurocrypt, LNCS 950, 1995, pp. 275-286.
    • (1995) Proceedings of Eurocrypt , vol.950 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 16
    • 19744369256 scopus 로고    scopus 로고
    • DDH-based group key agreement in a mobile environment
    • J. Nam, J. Lee, S. Kim, and D. Won, "DDH-based group key agreement in a mobile environment," Journal of Systems and Software, Vol. 78, 2005, pp. 73-83.
    • (2005) Journal of Systems and Software , vol.78 , pp. 73-83
    • Nam, J.1    Lee, J.2    Kim, S.3    Won, D.4
  • 17
    • 34548667976 scopus 로고    scopus 로고
    • Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
    • J. Nam, J. Paik, U. Kim, and D. Won, "Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks," Information Sciences, Vol. 177, 2007, pp. 5441-5467.
    • (2007) Information Sciences , vol.177 , pp. 5441-5467
    • Nam, J.1    Paik, J.2    Kim, U.3    Won, D.4
  • 18
    • 84873466407 scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • LNCS
    • M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," in Proceedings of Eurocrypt, LNCS 1807, 2000, pp. 139- 155.
    • (1807) Proceedings of Eurocrypt , vol.2000 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 20
    • 0003259063 scopus 로고    scopus 로고
    • Key management for multicast: Issues and architectures
    • D. Wallner, E. Harder, and R. Agee, "Key management for multicast: issues and architectures," RFC 2627, 1999.
    • (1999) RFC , vol.2627
    • Wallner, D.1    Harder, E.2    Agee, R.3
  • 26
    • 0346265020 scopus 로고    scopus 로고
    • Extending Joux's protocol to multi party key agreement
    • LNCS
    • R. Barua, R. Dutta, and P. Sarkar, "Extending Joux's protocol to multi party key agreement," in Proceedings of Indocrypt, LNCS 2904, 2003, pp. 205-217.
    • (2003) Proceedings of Indocrypt , vol.2904 , pp. 205-217
    • Barua, R.1    Dutta, R.2    Sarkar, P.3
  • 28
    • 23944461491 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • A. Joux, "A one round protocol for tripartite Diffie-Hellman," Journal of Cryptology, Vol. 17, 2003, 263-276.
    • (2003) Journal of Cryptology , vol.17 , pp. 263-276
    • Joux, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.