Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Key management for encrypted broadcast
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Provably authenticated group Diffie-Hellman key exchange
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Round-Optimal Contributory Conference Key Agreement
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Robust and Secure Broadcasting
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
DDH-based group key agreement in a mobile environment
Journal of Systems and Software
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Practical and provably-secure multicasting over high-delay networks
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part II
New multiparty authentication services and key agreement protocols
IEEE Journal on Selected Areas in Communications
Secured communication protocol for internetworking ZigBee cluster networks
Computer Communications
A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks
Wireless Communications & Mobile Computing
Hi-index | 0.01 |
While broadcasting services have witnessed substantial technological developments which are represented by group-oriented applications, an important on-going challenge is to design secure and efficient group key management. A number of protocols targeted for Pay-TV systems have been developed and proposed. However, most of the forward-secure protocols published up to now are not suitable for practical application in mobile devices. In this paper, we propose a secure and efficient two-round protocol which would fit well in Pay-TV systems and, additionally, in mobile environments covering internet stock quotes, audio and music deliveries, software updates and so on. Also we prove its security. The proposed protocol is of simplicity and efficiency and provably secure.