Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
Mathematics of Computation
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Proceedings of the 4th ACM conference on Computer and communications security
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Elliptic curves in cryptography
Elliptic curves in cryptography
Communications of the ACM
Chord: a scalable peer-to-peer lookup protocol for internet applications
IEEE/ACM Transactions on Networking (TON)
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Universally Composable Notions of Key Exchange and Secure Channels
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Identity Based Authenticated Group Key Agreement Protocol
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
The Decision Diffie-Hellman Problem
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
CLIQUES: A New Approach to Group Key Agreement
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Tree-based group key agreement
ACM Transactions on Information and System Security (TISSEC)
Attack on an ID-based authenticated group key agreement scheme from PKC 2004
Information Processing Letters
A One Round Protocol for Tripartite Diffie–Hellman
Journal of Cryptology
Identity-Based Fault-Tolerant Conference Key Agreement
IEEE Transactions on Dependable and Secure Computing
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
Modeling insider attacks on group key-exchange protocols
Proceedings of the 12th ACM conference on Computer and communications security
Distributed collaborative key agreement and authentication protocols for dynamic peer groups
IEEE/ACM Transactions on Networking (TON)
Scalable Protocols for Authenticated Group Key Exchange
Journal of Cryptology
Provably secure authenticated group Diffie-Hellman key exchange
ACM Transactions on Information and System Security (TISSEC)
ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments
APSCC '07 Proceedings of the The 2nd IEEE Asia-Pacific Service Computing Conference
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
International Journal of Security and Networks
On security proof of McCullagh Barreto's key agreement protocol and its variants
International Journal of Security and Networks
Energy-efficient ID-based group key agreement protocols for wireless networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
A new two-party identity-based authenticated key agreement
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Constant round dynamic group key agreement
ISC'05 Proceedings of the 8th international conference on Information Security
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
A survey of security visualization for computer network logs
Security and Communication Networks
Security and Communication Networks
Hi-index | 0.00 |
Dynamic Peer Group (DPG) applications, such as video-conferencing and multi-user gaming environments have proliferated the internet and group-key agreement protocols are critical in securing DPG communication. Identity-based cryptosystems avoid certificate management complications inherent to traditional public-key systems but introduce key escrow, which is highly undesirable in most applications. We design a scalable technique to eliminate key escrow and develop a distributed, escrow-less identity-based group-key agreement protocol for securing resource-constrained DPG communication. The proposed protocol is provably secure against passive adversaries, resilient to active attacks, scalable and more cost effective than any such protocol. We provide a detailed theoretical analysis to support the claims.