Asymmetric Group Key Agreement
From MaRDI portal
Publication:3627433
DOI10.1007/978-3-642-01001-9_9zbMath1239.94078OpenAlexW1537090015MaRDI QIDQ3627433
Yi Mu, Josep Domingo-Ferrer, Bo Qin, Willy Susilo, Qianhong Wu
Publication date: 12 May 2009
Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_9
Related Items (14)
Accountable identity-based encryption with distributed private key generators ⋮ An ID-based authenticated dynamic group key agreement with optimal round ⋮ Extended multivariate public key cryptosystems with secure encryption function ⋮ A position-aware Merkle tree for dynamic cloud data integrity verification ⋮ Provably secure one-round identity-based authenticated asymmetric group key agreement protocol ⋮ Group key agreement for secure group communication in dynamic peer systems ⋮ Provably secure threshold public-key encryption with adaptive security and short ciphertexts ⋮ A hierarchical group key agreement protocol using orientable attributes for cloud computing ⋮ Simulatable certificateless two-party authenticated key agreement protocol ⋮ Asymmetric Group Key Agreement ⋮ Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost ⋮ Fully Distributed Broadcast Encryption ⋮ Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol ⋮ Authenticated asymmetric group key agreement based on certificateless cryptosystem
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A one round protocol for tripartite Diffie-Hellman
- Generalized Identity Based and Broadcast Encryption Schemes
- Asymmetric Group Key Agreement
- A public key cryptosystem and a signature scheme based on discrete logarithms
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- New directions in cryptography
- Round-Optimal Contributory Conference Key Agreement
- Identity-Based Encryption from the Weil Pairing
- Easy Decision Diffie-Hellman Groups
- Secure integration of asymmetric and symmetric encryption schemes
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Advances in Cryptology - CRYPTO 2003
- Modular Security Proofs for Key Agreement Protocols
This page was built for publication: Asymmetric Group Key Agreement