Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Provably authenticated group Diffie-Hellman key exchange
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Security analysis of the cliques protocols suites: first results
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Mental poker game based on a bit commitment scheme through network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Towards a Survivable Security Architecture for Ad-Hoc Networks
Revised Papers from the 9th International Workshop on Security Protocols
Round-Optimal Contributory Conference Key Agreement
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Multiparty authentication services and key agreement protocols with semi-trusted third party
Journal of Computer Science and Technology
A Security Analysis of the Cliques Protocols Suites
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Exploring Robustness in Group Key Agreement
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Some attacks upon authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW14
Survivable Monitoring in Dynamic Networks
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
The Security and Privacy of Smart Vehicles
IEEE Security and Privacy
Asynchronous group key exchange with failures
Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing
Relating cryptography and formal methods: a panel
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
Identity-Based Fault-Tolerant Conference Key Agreement
IEEE Transactions on Dependable and Secure Computing
Authenticated key agreement in dynamic peer groups
Theoretical Computer Science
Resource-aware conference key establishment for heterogeneous networks
IEEE/ACM Transactions on Networking (TON)
DDH-based group key agreement in a mobile environment
Journal of Systems and Software
An efficient group key establishment in location-aided mobile ad hoc networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Scalable and fault-tolerant key agreement protocol for dynamic groups
International Journal of Network Management
A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC
Journal of Parallel and Distributed Computing - 19th International parallel and distributed processing symposium
On the impossibility of building secure cliques-type authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW17
Survivable Monitoring in Dynamic Networks
IEEE Transactions on Mobile Computing
A three round authenticated group key agreement protocol for ad hoc networks
Pervasive and Mobile Computing
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences: an International Journal
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy
Journal of Systems and Software
Provably secure authenticated group Diffie-Hellman key exchange
ACM Transactions on Information and System Security (TISSEC)
Information Sciences: an International Journal
Secure web service federation management using tpm virtualisation
Proceedings of the 2007 ACM workshop on Secure web services
Key agreement in ad hoc networks
International Journal of Computational Science and Engineering
A new group rekeying scheme based on t-packing designs for ad hoc networks
Proceedings of the 2nd international conference on Scalable information systems
Lower bounds and new constructions on secure group communication schemes
Theoretical Computer Science
Identity-based constant round group key exchange protocol via secret-share
WSEAS TRANSACTIONS on SYSTEMS
A conference key agreement protocol with fault-tolerant capability
Computer Standards & Interfaces
Constructing UC secure and constant-round group key exchange protocols via secret sharing
EURASIP Journal on Wireless Communications and Networking
A middleware service for mobile ad hoc data sharing, enhancing data availability
Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware
Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme
Journal of Computer Science and Technology
Security weakness of Tseng's fault-tolerant conference-key agreement protocol
Journal of Systems and Software
Secured communication protocol for internetworking ZigBee cluster networks
Computer Communications
Authenticated Key Exchange Protocol in One-Round
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
ID-Based Group Password-Authenticated Key Exchange
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Attacking Group Multicast Key Management Protocols Using Coral
Electronic Notes in Theoretical Computer Science (ENTCS)
Key agreement in ad hoc networks
ISPA'03 Proceedings of the 2003 international conference on Parallel and distributed processing and applications
Intrusion-tolerant architectures: concepts and design
Architecting dependable systems
Secure mobile content delivery using dynamic group key agreement with batch verification
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Group device pairing based secure sensor association and key management for body area networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Hierarchies of keys in secure multicast communications
Journal of Computer Security
A key management scheme for secure group communication using binomial key trees
International Journal of Network Management
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
A scalable multicast security protocol in hierarchy structures
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
A novel group key agreement protocol for wireless mesh network
Computers and Electrical Engineering
International Journal of Mobile Communications
An efficient dynamic group key agreement for low-power mobile devices
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Group key agreement protocol based on GH-KEP
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Cryptanalysis of two group key management protocols for secure multicast
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Comparison of cryptographic verification tools dealing with algebraic properties
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
A novel convinced diffie-hellman computation scheme and its cryptographic application
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Secure and efficient ID-based group key agreement fitted for Pay-TV
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
Secure group communications over combined wired and wireless networks
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Paradigm of multiparty joint authentication: evolving towards trust aware grid computing
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Efficient authenticated key agreement protocol for dynamic groups
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Trusted security devices for bandwidth conservation in IPSec environments
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
A diffie-hellman key exchange protocol without random oracles
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Security weakness in ren et al.'s group key agreement scheme built on secure two-party protocols
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Mutual authentication and group key agreement for low-power mobile devices
Computer Communications
A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks
Wireless Communications & Mobile Computing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
Multiparty quantum key agreement with single particles
Quantum Information Processing
Hi-index | 0.07 |
Many modern computing environments involve dynamic peer groups. Distributed simulation, multiuser games, conferencing applications, and replicated servers are just a few examples. Given the openness of today's networks, communication among peers (group members) must be secure and, at the same time, efficient. This paper studies the problem of authenticated key agreement in dynamic peer groups with the emphasis on efficient and provably secure key authentication, key confirmation, and integrity. It begins by considering two-party authenticated key agreement and extends the results to group Diffie-Hellman (1976) key agreement. In the process, some new security properties (unique to groups) are encountered and discussed