A public key cryptosystem and a signature scheme based on discrete logarithms
Proceedings of CRYPTO 84 on Advances in cryptology
Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Efficient and secure keys management for wireless mobile communications
Proceedings of the second ACM international workshop on Principles of mobile computing
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Multi-level Secure Multicast: The Rethinking of Secure Locks
ICPPW '02 Proceedings of the 2002 International Conference on Parallel Processing Workshops
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Secure and efficient group key management with shared key derivation
Computer Standards & Interfaces
Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Secure multicast in IPTV services
Computer Networks: The International Journal of Computer and Telecommunications Networking
A new probabilistic rekeying method for secure multicast groups
International Journal of Information Security
New directions in cryptography
IEEE Transactions on Information Theory
Key management approaches to offer data confidentiality for secure multicast
IEEE Network: The Magazine of Global Internetworking
Hierarchical approaches for multicast based on Euclid's algorithm
The Journal of Supercomputing
Reliable Key Management and Data Delivery Method in Multicast Over Wireless IPv6 Networks
Wireless Personal Communications: An International Journal
Hi-index | 7.29 |
The Extended Euclidean algorithm provides a fast solution to the problem of finding the greatest common divisor of two numbers. In this paper, we present three applications of the algorithm to the security and privacy field. The first one allows one to privately distribute a secret to a set of recipients with only one multicast communication. It can be used for rekeying purposes in a Secure Multicast scenario. The second one is an authentication mechanism to be used in environments in which a public-key infrastructure is not available. Finally, the third application of the Extended Euclidean algorithm is a zero-knowledge proof that reduces the number of messages between the two parts involved, with the aid of a central server.