A conference key distribution system
From MaRDI portal
Publication:3950456
DOI10.1109/TIT.1982.1056542zbMath0488.94021OpenAlexW2012168171MaRDI QIDQ3950456
No author found.
Publication date: 1982
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tit.1982.1056542
information securitycommunication systemauthorization schemematching encryption and decryption keysmultitap resistancepublic key ciphers
Related Items (43)
Participant attack on three-party quantum key agreement with two-photon entanglement ⋮ A conference key distribution system based on cross-product ⋮ A conference key distribution system for the star configuration based on the discrete logarithm problem ⋮ An observation on associative one-way functions in complexity theory ⋮ Multi-party quantum key agreement by an entangled six-qubit state ⋮ A new two-round dynamic authenticated contributory group key agreement protocol using elliptic curve Diffie-Hellman with privacy preserving public key infrastructure ⋮ (t,m) THRESHOLD AND GENERALIZED ID-BASED CONFERENCE KEY DISTRIBUTION SYSTEM ⋮ An ID-based authenticated dynamic group key agreement with optimal round ⋮ CoCoA: concurrent continuous group key agreement ⋮ Quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom ⋮ Hopf cyclic cohomology and Chern character of equivariant \(K\)-theories ⋮ Cryptanalysis of a multi-party quantum key agreement protocol with single particles ⋮ The three-party quantum key agreement protocol with quantum Fourier transform ⋮ Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement ⋮ Multi-party key agreement protocols with cheater identification ⋮ Scalable group key exchange protocol with provable security ⋮ Improvements on ``multiparty quantum key agreement with single particles ⋮ Distributed Merkle's puzzles ⋮ Multi-party quantum key agreement with Bell states and Bell measurements ⋮ One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model ⋮ Group key agreement for secure group communication in dynamic peer systems ⋮ Multiparty authentication services and key agreement protocols with semi-trusted third party. ⋮ Authenticated Group Key Agreement Protocol Without Pairing ⋮ Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks ⋮ Novel multiparty quantum key agreement protocol with GHZ states ⋮ A provable authenticated group key agreement protocol for mobile environment ⋮ Lower bounds and new constructions on secure group communication schemes ⋮ Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states ⋮ \((t,m)\) threshold and generalized ID-based conference key distribution system ⋮ A hierarchical group key agreement protocol using orientable attributes for cloud computing ⋮ Authenticated key agreement in dynamic peer groups ⋮ Private communications in hierarchical group-mobile radio system ⋮ Revisiting Pairing Based Group Key Exchange ⋮ A general compiler for password-authenticated group key exchange protocol ⋮ Group key exchange protocols from supersingular isogenies ⋮ Perfectly secure key distribution for dynamic conferences ⋮ Distributed key agreement for group communications based on elliptic curves. An application to sensor networks. ⋮ Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol ⋮ A secure and scalable group key exchange system ⋮ Security of Tseng--Jan's conference key distribution system ⋮ A novel cryptosystem based on grey system theory and genetic algorithm ⋮ Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks ⋮ A conference key distribution system
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An ID-based authenticated dynamic group key agreement with optimal round
- Securing group key exchange against strong corruptions and key registration attacks
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Identity-Based Cryptosystems and Signature Schemes
- Communication-Efficient 2-Round Group Key Establishment from Pairings
- Generic One Round Group Key Exchange in the Standard Model
- Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting
- Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
- A conference key distribution system
- Dynamic tree-based authenticated group key exchange protocol
- Advances in Cryptology - CRYPTO 2003
- Progress in Cryptology - INDOCRYPT 2003
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Constant-Round Authenticated Group Key Exchange for Dynamic Groups
- Public Key Cryptography – PKC 2004
This page was built for publication: A conference key distribution system