Advances in Cryptology - CRYPTO 2003

From MaRDI portal
Revision as of 03:46, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5428114


DOI10.1007/b11817zbMath1122.94426WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428114

Mordechai M. Yung, Jonathan N. Katz

Publication date: 28 November 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b11817


68P25: Data encryption (aspects in computer science)

68M12: Network protocols

94A62: Authentication, digital signatures and secret sharing


Related Items

One-Round Attribute-Based Key Exchange in the Multi-Party Setting, A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting, A strongly secure identity-based authenticated group key exchange protocol, Offline Assisted Group Key Exchange, An ID-based authenticated dynamic group key agreement with optimal round, Provably secure one-round identity-based authenticated asymmetric group key agreement protocol, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, An enhanced \((t,n)\) threshold directed signature scheme, Scalable attribute-based group key establishment: from~passive to active and deniable, Security weakness in a three-party pairing-based protocol for password authenticated key exchange, A general compiler for password-authenticated group key exchange protocol, A secure and scalable group key exchange system, A provable authenticated group key agreement protocol for mobile environment, Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings, Signed (group) Diffie-Hellman key exchange with tight security, Multicast key agreement, revisited, Pitfalls in a server-aided authenticated group key establishment, Attack on an ID-based authenticated group key agreement scheme from PKC 2004, Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks, Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model, Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks, One-Round Attribute-Based Key Exchange in the Multi-party Setting, Scalable group key exchange protocol with provable security, One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model, Communication-Efficient 2-Round Group Key Establishment from Pairings, UC-secure and Contributory Password-Authenticated Group Key Exchange, Authenticated Group Key Agreement Protocol Without Pairing, Password-based group key agreement protocol for client-server application, Proving Group Protocols Secure Against Eavesdroppers, Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting, Revisiting Pairing Based Group Key Exchange, Secure and Efficient Group Key Agreements for Cluster Based Networks, Asymmetric Group Key Agreement, A conference key distribution system