scientific article; zbMATH DE number 1088922
From MaRDI portal
Publication:4365747
zbMath0879.94021MaRDI QIDQ4365747
M. V. D. Burmester, Yvo G. Desmedt
Publication date: 26 January 1998
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (56)
Participant attack on three-party quantum key agreement with two-photon entanglement ⋮ A conference key distribution system for the star configuration based on the discrete logarithm problem ⋮ A new two-round dynamic authenticated contributory group key agreement protocol using elliptic curve Diffie-Hellman with privacy preserving public key infrastructure ⋮ Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution ⋮ Attack on an ID-based authenticated group key agreement scheme from PKC 2004 ⋮ ID-based authenticated group key agreement from bilinear maps ⋮ An ID-based authenticated dynamic group key agreement with optimal round ⋮ CoCoA: concurrent continuous group key agreement ⋮ Quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom ⋮ Cryptanalysis of a multi-party quantum key agreement protocol with single particles ⋮ One-Round Attribute-Based Key Exchange in the Multi-party Setting ⋮ The three-party quantum key agreement protocol with quantum Fourier transform ⋮ An active attack on a distributed group key exchange system ⋮ Offline Assisted Group Key Exchange ⋮ Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement ⋮ One-Round Attribute-Based Key Exchange in the Multi-Party Setting ⋮ Provably secure one-round identity-based authenticated asymmetric group key agreement protocol ⋮ Scalable group key exchange protocol with provable security ⋮ Multi-party quantum key agreement with Bell states and Bell measurements ⋮ One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model ⋮ Group key agreement for secure group communication in dynamic peer systems ⋮ A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort ⋮ Multiparty authentication services and key agreement protocols with semi-trusted third party. ⋮ Authenticated Group Key Agreement Protocol Without Pairing ⋮ Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks ⋮ A provable authenticated group key agreement protocol for mobile environment ⋮ Lower bounds and new constructions on secure group communication schemes ⋮ \((t,m)\) threshold and generalized ID-based conference key distribution system ⋮ Multi-party authenticated key agreement protocols from multi-linear forms ⋮ Authenticated key agreement in dynamic peer groups ⋮ Security Analysis of the Strong Diffie-Hellman Problem ⋮ Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting ⋮ A one-round secure message broadcasting protocol through a key sharing tree ⋮ Revisiting Pairing Based Group Key Exchange ⋮ Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups ⋮ A general compiler for password-authenticated group key exchange protocol ⋮ SAS-Based Group Authentication and Key Agreement Protocols ⋮ Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model ⋮ Discrete logarithm problems with auxiliary inputs ⋮ A Privacy-Preserving ID-Based Group Key Agreement Scheme Applied in VPAN ⋮ Post-Quantum Constant-Round Group Key Exchange from Static Assumptions ⋮ Scalable attribute-based group key establishment: from~passive to active and deniable ⋮ Secure and Efficient Group Key Agreements for Cluster Based Networks ⋮ Asymmetric Group Key Agreement ⋮ Password-authenticated group key establishment from smooth projective hash functions ⋮ On the Minimum Communication Effort for Secure Group Key Exchange ⋮ Group key exchange protocols from supersingular isogenies ⋮ Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness ⋮ Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution ⋮ Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol ⋮ A secure and scalable group key exchange system ⋮ Signed (group) Diffie-Hellman key exchange with tight security ⋮ A group key agreement protocol from pairings ⋮ Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks ⋮ A Clustering-based Group Key Agreement Protocol for Ad-Hoc Networks ⋮ A conference key distribution system
This page was built for publication: