DDH-based group key agreement in a mobile environment
Journal of Systems and Software
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy
Journal of Systems and Software
A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks
Computer Communications
Information Sciences: an International Journal
Performance optimization of region-based group key management in mobile ad hoc networks
Performance Evaluation
Security weakness in an authenticated group key agreement protocol in two rounds
Computer Communications
Lower bounds and new constructions on secure group communication schemes
Theoretical Computer Science
A general compiler for password-authenticated group key exchange protocol
Information Processing Letters
A security framework for Content-Based Publish-Subscribe system
Electronic Commerce Research and Applications
A secure and scalable Group Key Exchange system
Information Processing Letters
An efficient fault-tolerant group key agreement protocol
Computer Communications
Efficient cluster-based group key agreement protocols for wireless ad hoc networks
Journal of Network and Computer Applications
Proxy encryption based secure multicast in wireless mesh networks
Journal of Network and Computer Applications
Dynamic asymmetric group key agreement for ad hoc networks
Ad Hoc Networks
Research note: On the security of Wu and Yeh's conference key distribution system
Computer Communications
Research note: Using RSA with low exponent in a public network
Computer Communications
Secure broadcasting in large networks
Computer Communications
Conference key distribution schemes for portable communication systems
Computer Communications
Research note: A conference key distribution scheme based on the theory of quadratic residues
Computer Communications
Group key agreement for secure group communication in dynamic peer systems
Journal of Parallel and Distributed Computing
Management of groups and group keys in multi-level security environments
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Multi-party quantum key agreement with bell states and bell measurements
Quantum Information Processing
A new authenticated group key transfer protocol for actual network environment
International Journal of Ad Hoc and Ubiquitous Computing
On the security of an authenticated group key transfer protocol based on secret sharing
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Secure group key management scheme based on dual receiver cryptosystem
Proceedings of the first ACM workshop on Asia public-key cryptography
Fast transmission to remote cooperative groups: a new key management paradigm
IEEE/ACM Transactions on Networking (TON)
An improved fault-tolerant conference-key agreement protocol with forward secrecy
Proceedings of the 6th International Conference on Security of Information and Networks
Autonomous Shared Key Management Scheme for Space Networks
Wireless Personal Communications: An International Journal
A New Secure Authenticated Group Key Transfer Protocol
Wireless Personal Communications: An International Journal
Improvements on "multiparty quantum key agreement with single particles"
Quantum Information Processing
Hi-index | 754.84 |
Encryption is used in a communication system to safeguard information in the transmitted messages from anyone other than the intended receiver(s). To perform the encryption and decryption the transmitter and receiver(s) ought to have matching encryption and decryption keys. A clever way to generate these keys is to use the public key distribution system invented by Diffie and Hellman. That system, however, admits only one pair of communication stations to share a particular pair of encryption and decryption keys, The public key distribution system is generalized to a conference key distribution system (CKDS) which admits any group of stations to share the same encryption and decryption keys. The analysis reveals two important aspects of any conference key distribution system. One is the multitap resistance, which is a measure of the information security in the communication system. The other is the separation of the problem into two parts: the choice of a suitable symmetric function of the private keys and the choice of a suitable one-way mapping thereof. We have also shown how to use CKDS in connection with public key ciphers and an authorization scheme.