Advances in Cryptology - CRYPTO 2003

From MaRDI portal
Publication:5428114


DOI10.1007/b11817zbMath1122.94426WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428114

Mordechai M. Yung, Jonathan N. Katz

Publication date: 28 November 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b11817


68P25: Data encryption (aspects in computer science)

68M12: Network protocols

94A62: Authentication, digital signatures and secret sharing


Related Items

An ID-based authenticated dynamic group key agreement with optimal round, Provably secure one-round identity-based authenticated asymmetric group key agreement protocol, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, An enhanced \((t,n)\) threshold directed signature scheme, Scalable attribute-based group key establishment: from~passive to active and deniable, Security weakness in a three-party pairing-based protocol for password authenticated key exchange, A general compiler for password-authenticated group key exchange protocol, A secure and scalable group key exchange system, Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings, Attack on an ID-based authenticated group key agreement scheme from PKC 2004, Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks, Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model, Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks, One-Round Attribute-Based Key Exchange in the Multi-party Setting, Scalable group key exchange protocol with provable security, Communication-Efficient 2-Round Group Key Establishment from Pairings, UC-secure and Contributory Password-Authenticated Group Key Exchange, Password-based group key agreement protocol for client-server application, Proving Group Protocols Secure Against Eavesdroppers, Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting, Revisiting Pairing Based Group Key Exchange, Secure and Efficient Group Key Agreements for Cluster Based Networks, Asymmetric Group Key Agreement, A conference key distribution system