Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Round-Optimal Contributory Conference Key Agreement
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
A secure and scalable Group Key Exchange system
Information Processing Letters
Dynamic group key agreement in tree-based setting
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Mutual authentication and group key agreement for low-power mobile devices
Computer Communications
Information Sciences: an International Journal
Low-power authenticated group key agreement for heterogeneous wireless networks
International Journal of Security and Networks
Security weakness in an authenticated group key agreement protocol in two rounds
Computer Communications
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Security Analysis of Joint Group Key Agreement Protocol
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Secure and Efficient Group Key Agreements for Cluster Based Networks
Transactions on Computational Science IV
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
International Journal of Security and Networks
On security models and compilers for group key exchange protocols
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Secure mobile content delivery using dynamic group key agreement with batch verification
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Comments on "provably secure constant round contributory group key agreement in dynamic setting"
IEEE Transactions on Information Theory
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.06 |
We present a fully symmetric constant round authenticated group key agreement protocol in dynamic scenario. Our proposed scheme achieves forward secrecy and is provably secure under DDH assumption in the security model of Bresson et al. providing, we feel, better security guarantee than previously published results. The protocol is efficient in terms of both communication and computation power.