Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Communications of the ACM
The LSD Broadcast Encryption Scheme
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Key Agreement Protocols and Their Security Analysis
Proceedings of the 6th IMA International Conference on Cryptography and Coding
A One Round Protocol for Tripartite Diffie–Hellman
Journal of Cryptology
Asymmetric Group Key Agreement
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Simulatable certificateless two-party authenticated key agreement protocol
Information Sciences: an International Journal
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Efficient many-to-one authentication with certificateless aggregate signatures
Computer Networks: The International Journal of Computer and Telecommunications Networking
Collusion resistant broadcast encryption with short ciphertexts and private keys
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Hierarchical identity based encryption with constant size ciphertext
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Constant round dynamic group key agreement
ISC'05 Proceedings of the 8th international conference on Information Security
New directions in cryptography
IEEE Transactions on Information Theory
High Performance Group Merging/Splitting Scheme for Group Key Management
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Asymmetric group key agreement is a recently introduced versatile cryptographic primitive. It allows a group of users to negotiate a common encryption key which is accessible to any entities, and each user only holds her respective secret decryption key. This concept not only enables confidential communications among group users but also permits any outsider to send encrypted messages to the group. The existing instantiation is only secure against passive adversaries. In this paper, we first introduce an authenticated asymmetric group key agreement protocol which offers security against active attacks in open networks. Based on this protocol, we then propose a broadcast encryption system without relying on a trusted dealer to distribute the secret keys to the users. Our system is equipped with the perfect forward security property and has short ciphertexts. Improved systems are also described to allow a sender to select receivers for broadcast encryption and to balance the transmission overhead against the ciphertext size.