Advances in Cryptology - CRYPTO 2003

From MaRDI portal
Revision as of 02:46, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5428114

DOI10.1007/B11817zbMath1122.94426OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428114

Mordechai M. Yung, Jonathan N. Katz

Publication date: 28 November 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b11817




Related Items (34)

Password-based group key agreement protocol for client-server applicationA strongly secure identity-based authenticated group key exchange protocolUC-secure and Contributory Password-Authenticated Group Key ExchangeMulticast key agreement, revisitedAttack on an ID-based authenticated group key agreement scheme from PKC 2004Security weakness in a three-party pairing-based protocol for password authenticated key exchangeAn ID-based authenticated dynamic group key agreement with optimal roundOne-Round Attribute-Based Key Exchange in the Multi-party SettingOffline Assisted Group Key ExchangeOne-Round Attribute-Based Key Exchange in the Multi-Party SettingA Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage SettingProvably secure one-round identity-based authenticated asymmetric group key agreement protocolScalable group key exchange protocol with provable securityOne-Round Cross-Domain Group Key Exchange Protocol in the Standard ModelProving Group Protocols Secure Against EavesdroppersAuthenticated Group Key Agreement Protocol Without PairingResource-aware protocols for authenticated group key exchange in integrated wired and wireless networksBeyond eCK: perfect forward secrecy under actor compromise and ephemeral-key revealA provable authenticated group key agreement protocol for mobile environmentComputationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairingsProvably Secure N-Party Authenticated Key Exchange in the Multicast DPWA SettingRevisiting Pairing Based Group Key ExchangeA general compiler for password-authenticated group key exchange protocolPitfalls in a server-aided authenticated group key establishmentRound-Optimal Password-Based Group Key Exchange Protocols in the Standard ModelAn enhanced \((t,n)\) threshold directed signature schemeCommunication-Efficient 2-Round Group Key Establishment from PairingsScalable attribute-based group key establishment: from~passive to active and deniableSecure and Efficient Group Key Agreements for Cluster Based NetworksAsymmetric Group Key AgreementA secure and scalable group key exchange systemSigned (group) Diffie-Hellman key exchange with tight securityDesign, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor NetworksA conference key distribution system







This page was built for publication: Advances in Cryptology - CRYPTO 2003