메뉴 건너뛰기




Volumn 16, Issue 9 B, 2013, Pages 6817-6830

More secure authenticated group key agreement in a mobile environment

Author keywords

Bilinear pairings; Group key agreement; Provable security; Wireless network.

Indexed keywords


EID: 84892170092     PISSN: 13434500     EISSN: 13448994     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (2)

References (34)
  • 1
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in ad hoc networks
    • DOI 10.1016/S0140-3664(00)00249-8
    • Asokan N. and Ginzboorg P., Key agreement in ad hoc networks, Computer Communications, 23(2000), 1627-1637. (Pubitemid 32033563)
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 2
    • 34547348650 scopus 로고    scopus 로고
    • Id-based ring signature and proxy ring signature schemes from bilinear pairings
    • Awasthi A. K. and Lal S., Id-based ring signature and proxy ring signature schemes from bilinear pairings, International Journal of Network Security, 4(2007), 187-192.
    • (2007) International Journal of Network Security , vol.4 , pp. 187-192
    • Awasthi, A.K.1    Lal, S.2
  • 3
    • 0027589399 scopus 로고
    • Fully-fledged two-way public key authentication and key agreement for low-cost terminals
    • Beller M. J. and Yacobi Y., Fully-fledged two-way public key authentication and key agreement for low-cost terminals, IEE Electronics Letters, 29(1993), 999-1001.
    • (1993) IEE Electronics Letters , vol.29 , pp. 999-1001
    • Beller, M.J.1    Yacobi, Y.2
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the well pairing
    • LNCS 2139
    • Boneh D. and Franklin M., Identity based encryption from the well pairing, Advances in Cryptology-Crypto'2001, LNCS 2139, 2001, 213-229.
    • (2001) Advances in Cryptology-Crypto' , vol.2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 4544386246 scopus 로고    scopus 로고
    • Mutual authentication and group key agreement for low-power mobile devices
    • Bresson E., Chevassut O., Essiari A., and Pointcheval D., Mutual authentication and group key agreement for low-power mobile devices, Computer Communications, 27(2004), 1730-1737.
    • (2004) Computer Communications , vol.27 , pp. 1730-1737
    • Bresson, E.1    Chevassut, O.2    Essiari, A.3    Pointcheval, D.4
  • 8
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution system
    • (Proc. Eurocrypt 1994)
    • Burmester M. and Desmedt Y., A secure and efficient conference key distribution system, Lecture Notes in Computer Science (Proc. Eurocrypt 1994), 950(1995), 275-286.
    • (1995) Lecture Notes in Computer Science , vol.950 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 10
    • 84255215492 scopus 로고    scopus 로고
    • Towards a practical and sealable trusted software dissemination system
    • Chuan D., Lin Y., Linru M., and Yuan C., Towards a practical and sealable trusted software dissemination system, Journal of Convergence, 2(2011), 53-60.
    • (2011) Journal of Convergence , vol.2 , pp. 53-60
    • Chuan, D.1    Lin, Y.2    Linru, M.3    Yuan, C.4
  • 11
    • 34848813206 scopus 로고    scopus 로고
    • All-in-one group-oriented cryptosystem based on bilinear pairing
    • DOI 10.1016/j.ins.2007.06.026, PII S002002550700326X
    • Chung J. T., Li C. M., and Hwang T., All-in-one group-oriented cryptosystem based on bilinear pairing, Information Sciences, 177(2007), 5651-5663. (Pubitemid 47495921)
    • (2007) Information Sciences , vol.177 , Issue.24 , pp. 5651-5663
    • Chung, J.-T.1    Li, C.-M.2    Hwang, T.3
  • 12
    • 43749092801 scopus 로고    scopus 로고
    • Provably secure constant round contributory group key agreement in dynamic setting
    • DOI 10.1109/TIT.2008.920224
    • Dutta R. and Barua R., Provably secure constant round contributory group key agreement in dynamic setting, IEEE Transaction on Infomormation Theory, 54(2008), 2007-2025. (Pubitemid 351689545)
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.5 , pp. 2007-2025
    • Dutta, R.1    Barua, R.2
  • 15
    • 0029256120 scopus 로고
    • Conference key distribution protocols for digital mobile communication systems
    • Hwang M. S. and Yang W. P., Conference key distribution protocols for digital mobile communication systems, IEEE Journal on Selected Areas in Communications, 13(1995), 416-420.
    • (1995) IEEE Journal on Selected Areas in Communications , vol.13 , pp. 416-420
    • Hwang, M.S.1    Yang, W.P.2
  • 20
    • 19744369256 scopus 로고    scopus 로고
    • DDH-based group key agreement in a mobile environment
    • DOI 10.1016/j.jss.2004.10.024, PII S0164121204002262
    • Nam J., Lee J., Kim S., and Won D., DDH-based group key agreement in a mobile environment, The Journal of Systems and Software, 78(2005), 73-83. (Pubitemid 40743528)
    • (2005) Journal of Systems and Software , vol.78 , Issue.1 , pp. 73-83
    • Nam, J.1    Lee, J.2    Kim, S.3    Won, D.4
  • 21
    • 33846643950 scopus 로고    scopus 로고
    • Self-certified signature scheme from pairings
    • DOI 10.1016/j.jss.2006.05.033, PII S016412120600166X
    • Shao Z., Self-certified signature scheme from pairings, The Journal of Systems and Software, 80(2007), 388-395. (Pubitemid 46187280)
    • (2007) Journal of Systems and Software , vol.80 , Issue.3 SPEC. ISS. , pp. 388-395
    • Shao, Z.1
  • 22
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • Shoup V., Lower bounds for discrete logarithms and related problems, Proceedings of advances in cryptology-Eurocrypt '97, 1997, 256-266.
    • (1997) Proceedings of Advances in Cryptology-Eurocrypt ' , vol.97 , pp. 256-266
    • Shoup, V.1
  • 24
    • 0029720059 scopus 로고    scopus 로고
    • Diffie-Hellman key distribution extended to group communication
    • Steiner M., Tsudik G., and Waidner M., Diffie-Hellman key distribution extended to group communication, Proceedings of ACM CCS 1996,1996, 31-37.
    • (1996) Proceedings of ACM CCS , vol.1996 , pp. 31-37
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 25
    • 0347309397 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of key distribution system for VS AT satellite communications
    • Tseng Y. M., Cryptanalysis and improvement of key distribution system for VS AT satellite communications, Informatica, 13(2002), 369-376.
    • (2002) Informatica , vol.13 , pp. 369-376
    • Tseng, Y.M.1
  • 26
    • 0344984336 scopus 로고    scopus 로고
    • A scalable key management scheme with minimizing key storage for secure group communications
    • Tseng Y. M., A scalable key management scheme with minimizing key storage for secure group communications, International Journal of Network Management, 13(2003), 419-425.
    • (2003) International Journal of Network Management , vol.13 , pp. 419-425
    • Tseng, Y.M.1
  • 27
    • 25844432081 scopus 로고    scopus 로고
    • A robust multi-party key agreement protocol resistant to malicious participants
    • Tseng Y. M., A robust multi-party key agreement protocol resistant to malicious participants, The Computer Journal, 48(2005), 480-487.
    • (2005) The Computer Journal , vol.48 , pp. 480-487
    • Tseng, Y.M.1
  • 28
    • 34249876364 scopus 로고    scopus 로고
    • A resource-constrained group key agreement protocol for imbalanced wireless networks
    • Tseng Y. M., A resource-constrained group key agreement protocol for imbalanced wireless networks, Computers & Security, 26(2007), 331-337.
    • (2007) Computers & Security , vol.26 , pp. 331-337
    • Tseng, Y.M.1
  • 29
    • 80052855282 scopus 로고    scopus 로고
    • A secure group key management scheme for wireless cellular systems
    • Um H. and Delp Edward J., A secure group key management scheme for wireless cellular systems, International Journal of Network Security, 6(2008), 40-52.
    • (2008) International Journal of Network Security , vol.6 , pp. 40-52
    • Um, H.1    Delp Edward, J.2
  • 30
    • 34248512208 scopus 로고    scopus 로고
    • Identity based proxy multi-signature
    • DOI 10.1016/j.jss.2006.12.565, PII S0164121207000039, Dynamic Resource Management in Distributed Real-Time Systems
    • Wang Q. and Cao Z., Identity based proxy multi-signature, The Journal of Systems and Soñware, 80(2007), 1023-1029. (Pubitemid 46754473)
    • (2007) Journal of Systems and Software , vol.80 , Issue.7 , pp. 1023-1029
    • Wang, Q.1    Cao, Z.2
  • 33
    • 84874110332 scopus 로고    scopus 로고
    • Medium access control with dynamic frame length in wireless sensor networks
    • Yoo D. S. and Choi S. S., Medium access control with dynamic frame length in wireless sensor networks, Journal of Information Processing Systems, 6(2010), 501-510.
    • Journal of Information Processing Systems , vol.6 , Issue.2010 , pp. 501-510
    • Yoo, D.S.1    Choi, S.S.2
  • 34
    • 84886885367 scopus 로고    scopus 로고
    • Probabilistic soft error detection based on anomaly speculation
    • Yoo J., Probabilistic soft error detection based on anomaly speculation, Journal of Information Processing Systems, 7(2011), 435-446.
    • Journal of Information Processing Systems , vol.7 , Issue.2011 , pp. 435-446
    • Yoo, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.