Advances in Cryptology - CRYPTO 2003
From MaRDI portal
Publication:5428114
DOI10.1007/b11817zbMath1122.94426OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428114
Mordechai M. Yung, Jonathan N. Katz
Publication date: 28 November 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b11817
Data encryption (aspects in computer science) (68P25) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items
Password-based group key agreement protocol for client-server application, A strongly secure identity-based authenticated group key exchange protocol, UC-secure and Contributory Password-Authenticated Group Key Exchange, Multicast key agreement, revisited, Attack on an ID-based authenticated group key agreement scheme from PKC 2004, Security weakness in a three-party pairing-based protocol for password authenticated key exchange, An ID-based authenticated dynamic group key agreement with optimal round, One-Round Attribute-Based Key Exchange in the Multi-party Setting, Offline Assisted Group Key Exchange, One-Round Attribute-Based Key Exchange in the Multi-Party Setting, A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting, Provably secure one-round identity-based authenticated asymmetric group key agreement protocol, Scalable group key exchange protocol with provable security, One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model, Proving Group Protocols Secure Against Eavesdroppers, Authenticated Group Key Agreement Protocol Without Pairing, Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, A provable authenticated group key agreement protocol for mobile environment, Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings, Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting, Revisiting Pairing Based Group Key Exchange, A general compiler for password-authenticated group key exchange protocol, Pitfalls in a server-aided authenticated group key establishment, Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model, An enhanced \((t,n)\) threshold directed signature scheme, Communication-Efficient 2-Round Group Key Establishment from Pairings, Scalable attribute-based group key establishment: from~passive to active and deniable, Secure and Efficient Group Key Agreements for Cluster Based Networks, Asymmetric Group Key Agreement, A secure and scalable group key exchange system, Signed (group) Diffie-Hellman key exchange with tight security, Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks, A conference key distribution system