An identity-based key-exchange protocol
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Zero-knowledge undeniable signatures (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
How to securely replicate services
ACM Transactions on Programming Languages and Systems (TOPLAS)
A security architecture for fault-tolerant systems
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
Distributing trust with the Rampart toolkit
Communications of the ACM
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Communication complexity of group key distribution
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring
Information Processing Letters
A high-throughput secure reliable multicast protocol
Journal of Computer Security
Building Secure and Reliable Network Applications
Building Secure and Reliable Network Applications
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A Secure Audio Teleconference System
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
On the Risk of Opening Distributed Keys
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Authenticated Multi-Party Key Agreement
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Number-theoretic constructions of efficient pseudo-random functions
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Secure Reliable Multicast Protocols in a WAN
ICDCS '97 Proceedings of the 17th International Conference on Distributed Computing Systems (ICDCS '97)
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
An Efficient Off-line Electronic Cash System Based On The Representation Problem.
An Efficient Off-line Electronic Cash System Based On The Representation Problem.
A Secure Group Membership Protocol
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
New multiparty authentication services and key agreement protocols
IEEE Journal on Selected Areas in Communications
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
Formalizing GDOI group key management requirements in NPATRL
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
A secure multicast protocol with copyright protection
ACM SIGCOMM Computer Communication Review
Secure Key-Evolving Protocols for Discrete Logarithm Schemes
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Identity Based Authenticated Group Key Agreement Protocol
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Constant Size Rekeying Message Framework for Secure Multicasting
LCN '01 Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
Exploring Robustness in Group Key Agreement
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
Secure Group Communication Using Robust Contributory Key Agreement
IEEE Transactions on Parallel and Distributed Systems
Survivable Monitoring in Dynamic Networks
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Tree-based group key agreement
ACM Transactions on Information and System Security (TISSEC)
A security design for a general purpose, self-organizing, multihop ad hoc wireless network
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Asynchronous group key exchange with failures
Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing
On the performance of group key agreement protocols
ACM Transactions on Information and System Security (TISSEC)
Exploring adaptability of secure group communication using formal prototyping techniques
ARM '04 Proceedings of the 3rd workshop on Adaptive and reflective middleware
New application of reliable agreement: underlying an unsecured business environment
ACM SIGOPS Operating Systems Review
Identity-Based Fault-Tolerant Conference Key Agreement
IEEE Transactions on Dependable and Secure Computing
Authenticated key agreement in dynamic peer groups
Theoretical Computer Science
A secure and scalable group key exchange system
Information Processing Letters
DDH-based group key agreement in a mobile environment
Journal of Systems and Software
An efficient group key establishment in location-aided mobile ad hoc networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Energy-efficient and scalable group key agreement for large ad hoc networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Secure Spread: An Integrated Architecture for Secure Group Communication
IEEE Transactions on Dependable and Secure Computing
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
Key distribution and update for secure inter-group multicast communication
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Scalable and fault-tolerant key agreement protocol for dynamic groups
International Journal of Network Management
Low-power group key agreement for heterogeneous wireless networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC
Journal of Parallel and Distributed Computing - 19th International parallel and distributed processing symposium
Survivable Monitoring in Dynamic Networks
IEEE Transactions on Mobile Computing
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
A computationally efficient key-hiding based group re-keying scheme for secure multicasting
International Journal of Computers and Applications
Key bundles and parcels: secure communication in many groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Distributed collaborative key agreement and authentication protocols for dynamic peer groups
IEEE/ACM Transactions on Networking (TON)
A three round authenticated group key agreement protocol for ad hoc networks
Pervasive and Mobile Computing
SEAL: A secure communication library for building dynamic group key agreement applications
Journal of Systems and Software
Chinese remainder theorem based group key management
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Tree-based group key agreement framework for mobile ad-hoc networks
Future Generation Computer Systems
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy
Journal of Systems and Software
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
An overlay approach to data security in ad-hoc networks
Ad Hoc Networks
Provably secure authenticated group Diffie-Hellman key exchange
ACM Transactions on Information and System Security (TISSEC)
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Information Sciences: an International Journal
Improved ID-based security framework for ad hoc network
Ad Hoc Networks
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes
IEEE Transactions on Dependable and Secure Computing
Robust group key agreement using short broadcasts
Proceedings of the 14th ACM conference on Computer and communications security
Mind your manners: socially appropriate wireless key establishment for groups
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Performance optimization of region-based group key management in mobile ad hoc networks
Performance Evaluation
Key agreement in ad hoc networks
International Journal of Computational Science and Engineering
A scalable group-rekeying scheme using secret mask patterns
International Journal of High Performance Computing and Networking
Low-power authenticated group key agreement for heterogeneous wireless networks
International Journal of Security and Networks
Hierarchical group access control for secure multicast communications
IEEE/ACM Transactions on Networking (TON)
Recursive protocol for group-oriented authentication with key distribution
Journal of Systems and Software
Energy-Efficient Group Key Management Protocols for Hierarchical Sensor Networks
International Journal of Distributed Sensor Networks - Sensor Networks, Ubiquitous and Trustworthy Computing
Distributed key management for dynamic groups in MANETs
Pervasive and Mobile Computing
GAnGS: gather, authenticate 'n group securely
Proceedings of the 14th ACM international conference on Mobile computing and networking
Ternary Tree Based Group Key Management in Dynamic Peer Networks
Computational Intelligence and Security
Lower bounds and new constructions on secure group communication schemes
Theoretical Computer Science
Identity-based constant round group key exchange protocol via secret-share
WSEAS TRANSACTIONS on SYSTEMS
A heterogeneity-aware framework for group key management in wireless mesh networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A conference key agreement protocol with fault-tolerant capability
Computer Standards & Interfaces
Constructing UC secure and constant-round group key exchange protocols via secret sharing
EURASIP Journal on Wireless Communications and Networking
Group Key Management: From a Non-hierarchical to a Hierarchical Structure
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Information Security and Cryptology --- ICISC 2008
SPATE: small-group PKI-less authenticated trust establishment
Proceedings of the 7th international conference on Mobile systems, applications, and services
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Group key management in wireless mesh networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
nPAKE+: a tree-based group password-authenticated key exchange protocol using different passwords
Journal of Computer Science and Technology
Overlay Ring Based Secure Group Communication Scheme for Mobile Agents
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
An on-demand key establishment protocol for MANETs
International Journal of Wireless and Mobile Computing
A general compiler for password-authenticated group key exchange protocol
Information Processing Letters
A case for P2P infrastructure for social networks - opportunities & challenges
WONS'09 Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services
ID-Based Group Password-Authenticated Key Exchange
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
Key agreement for heterogeneous mobile ad-hoc groups
International Journal of Wireless and Mobile Computing
A secure and scalable Group Key Exchange system
Information Processing Letters
Noninteractive self-certification for long-lived mobile ad hoc networks
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
An efficient fault-tolerant group key agreement protocol
Computer Communications
Key agreement in ad hoc networks
ISPA'03 Proceedings of the 2003 international conference on Parallel and distributed processing and applications
A dynamic group key distribution scheme with flexible user join
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Efficient multicast key management for stateless receivers
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Efficient re-keying protocols for multicast encryption
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
A group key distribution scheme with decentralised user join
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
An energy and communication efficient group key in sensor networks using elliptic curve polynomial
ADHOC-NOW'07 Proceedings of the 6th international conference on Ad-hoc, mobile and wireless networks
ECGK: An efficient clustering scheme for group key management in MANETs
Computer Communications
DLPKH - distributed logical public-key hierarchy
ICISS'07 Proceedings of the 3rd international conference on Information systems security
nPAKE+: a hierarchical group password-authenticated key exchange protocol using different passwords
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Supporting mobility in GKM over ad-hoc network using a decentralized and spontaneous algorithm
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Secure mobile content delivery using dynamic group key agreement with batch verification
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Secure group key agreement protocol based on chaotic Hash
Information Sciences: an International Journal
Finite models for formal security proofs
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
On design tradeoffs between security and performance in wireless group communicating systems
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Energy-efficient ID-based group key agreement protocols for wireless networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
On the insecurity of proactive RSA in the URSA mobile ad hoc network access control protocol
IEEE Transactions on Information Forensics and Security
A lightweight group-key management protocol for secure ad-hoc-network routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic asymmetric group key agreement for ad hoc networks
Ad Hoc Networks
A scalable multicast security protocol in hierarchy structures
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Wireless Personal Communications: An International Journal
A scalable password-based group key exchange protocol in the standard model
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
An efficient dynamic group key agreement for low-power mobile devices
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Secure group communication with low communication complexity
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Group key agreement protocol based on GH-KEP
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Efficient group key management for dynamic peer networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Cryptanalysis of two group key management protocols for secure multicast
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
A novel convinced diffie-hellman computation scheme and its cryptographic application
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Scalable group key management with partially trusted controllers
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Efficient authenticated key agreement protocol for dynamic groups
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Practical and provably-secure multicasting over high-delay networks
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part II
Pseudonym generation scheme for ad-hoc group communication based on IDH
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Alternation in equational tree automata modulo XOR
FSTTCS'04 Proceedings of the 24th international conference on Foundations of Software Technology and Theoretical Computer Science
Identity-Based access control for ad hoc groups
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
A flexible framework for secret handshakes
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Authenticated and communication efficient group key agreement for clustered ad hoc networks
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Verifiable agreement: limits of non-repudiation in mobile peer-to-peer ad hoc networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Security weakness in ren et al.'s group key agreement scheme built on secure two-party protocols
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Bridging broadcast encryption and group key agreement
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Multi-party quantum key agreement with bell states and bell measurements
Quantum Information Processing
A communication efficient group key distribution scheme for MANETs
NSS'12 Proceedings of the 6th international conference on Network and System Security
Secure group key management scheme based on dual receiver cryptosystem
Proceedings of the first ACM workshop on Asia public-key cryptography
SafeSlinger: easy-to-use and secure public-key exchange
Proceedings of the 19th annual international conference on Mobile computing & networking
Fast transmission to remote cooperative groups: a new key management paradigm
IEEE/ACM Transactions on Networking (TON)
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks
Mobile Networks and Applications
An improved fault-tolerant conference-key agreement protocol with forward secrecy
Proceedings of the 6th International Conference on Security of Information and Networks
High Performance Group Merging/Splitting Scheme for Group Key Management
Wireless Personal Communications: An International Journal
Secure group re-keying using key inverses
Journal of High Speed Networks
An anonymous DRM scheme for sharing multimedia files in P2P networks
Multimedia Tools and Applications
Hi-index | 0.00 |
As a result of the increased popularity of group-oriented applications and protocols, group communication occurs in many different settings: from network multicasting to application layer tele- and videoconferencing. Regardless of the application environment, security services are necessary to provide communication privacy and integrity. This paper considers the problem of key agreement in dynamic peer groups. (Key agreement, especially in a group setting, is the stepping stone for all other security services.) Dynamic peer groups require not only initial key agreement (IKA) but also auxiliary key agreement (AKA) operations, such as member addition, member deletion, and group fusion. We discuss all group key agreement operations and present a concrete protocol suite, CLIQUES, which offers complete key agreement services. CLIQUES is based on multiparty extensions of the well-known Diffie-Hellman key exchange method. The protocols are efficient and provably secure against passive adversaries.