Advances in Cryptology - CRYPTO 2003
From MaRDI portal
Publication:5428114
DOI10.1007/B11817zbMath1122.94426OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428114
Mordechai M. Yung, Jonathan N. Katz
Publication date: 28 November 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b11817
Data encryption (aspects in computer science) (68P25) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items (34)
Password-based group key agreement protocol for client-server application ⋮ A strongly secure identity-based authenticated group key exchange protocol ⋮ UC-secure and Contributory Password-Authenticated Group Key Exchange ⋮ Multicast key agreement, revisited ⋮ Attack on an ID-based authenticated group key agreement scheme from PKC 2004 ⋮ Security weakness in a three-party pairing-based protocol for password authenticated key exchange ⋮ An ID-based authenticated dynamic group key agreement with optimal round ⋮ One-Round Attribute-Based Key Exchange in the Multi-party Setting ⋮ Offline Assisted Group Key Exchange ⋮ One-Round Attribute-Based Key Exchange in the Multi-Party Setting ⋮ A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting ⋮ Provably secure one-round identity-based authenticated asymmetric group key agreement protocol ⋮ Scalable group key exchange protocol with provable security ⋮ One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model ⋮ Proving Group Protocols Secure Against Eavesdroppers ⋮ Authenticated Group Key Agreement Protocol Without Pairing ⋮ Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks ⋮ Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal ⋮ A provable authenticated group key agreement protocol for mobile environment ⋮ Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings ⋮ Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting ⋮ Revisiting Pairing Based Group Key Exchange ⋮ A general compiler for password-authenticated group key exchange protocol ⋮ Pitfalls in a server-aided authenticated group key establishment ⋮ Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model ⋮ An enhanced \((t,n)\) threshold directed signature scheme ⋮ Communication-Efficient 2-Round Group Key Establishment from Pairings ⋮ Scalable attribute-based group key establishment: from~passive to active and deniable ⋮ Secure and Efficient Group Key Agreements for Cluster Based Networks ⋮ Asymmetric Group Key Agreement ⋮ A secure and scalable group key exchange system ⋮ Signed (group) Diffie-Hellman key exchange with tight security ⋮ Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks ⋮ A conference key distribution system
This page was built for publication: Advances in Cryptology - CRYPTO 2003