An identity-based key-exchange protocol
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
On the importance of securing your bins: the garbage-man-in-the-middle attack
Proceedings of the 4th ACM conference on Computer and communications security
Authenticated group key agreement and friends
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
A Pseudorandom Generator from any One-way Function
SIAM Journal on Computing
A review of experiences with reliable multicast
Software—Practice & Experience
Provably authenticated group Diffie-Hellman key exchange
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Group communication specifications: a comprehensive study
ACM Computing Surveys (CSUR)
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
A Secure Audio Teleconference System
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Authenticated Multi-Party Key Agreement
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Smart Cards - Requirements, Properties, and Applications
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Using a High-Performance, Programmable Secure Coprocessor
FC '98 Proceedings of the Second International Conference on Financial Cryptography
A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
The Decision Diffie-Hellman Problem
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Number-theoretic constructions of efficient pseudo-random functions
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Session key distribution using smart cards
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
STACS'99 Proceedings of the 16th annual conference on Theoretical aspects of computer science
The Group Diffie-Hellman Problems
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Round-Optimal Contributory Conference Key Agreement
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Some attacks upon authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW14
A secure and scalable group key exchange system
Information Processing Letters
DDH-based group key agreement in a mobile environment
Journal of Systems and Software
Modeling insider attacks on group key-exchange protocols
Proceedings of the 12th ACM conference on Computer and communications security
A three round authenticated group key agreement protocol for ad hoc networks
Pervasive and Mobile Computing
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy
Journal of Systems and Software
Provably secure authenticated group Diffie-Hellman key exchange
ACM Transactions on Information and System Security (TISSEC)
Information Sciences: an International Journal
Strong password-based authentication in TLS using the three-party group Diffie Hellman protocol
International Journal of Security and Networks
Securing group key exchange against strong corruptions
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Security weakness in an authenticated group key agreement protocol in two rounds
Computer Communications
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Identity-based constant round group key exchange protocol via secret-share
WSEAS TRANSACTIONS on SYSTEMS
Securing group key exchange against strong corruptions and key registration attacks
International Journal of Applied Cryptography
Password-based authenticated key establishment for wireless group communications in an ad-hoc mode
International Journal of Communication Networks and Distributed Systems
Constructing UC secure and constant-round group key exchange protocols via secret sharing
EURASIP Journal on Wireless Communications and Networking
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Secure and Efficient Group Key Agreements for Cluster Based Networks
Transactions on Computational Science IV
Universally composable contributory group key exchange
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Asymmetric Group Key Agreement
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Security weakness of Tseng's fault-tolerant conference-key agreement protocol
Journal of Systems and Software
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Authenticated Key Exchange Protocol in One-Round
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
A constant rounds group key agreement protocol without using hash functions
International Journal of Network Management
A general compiler for password-authenticated group key exchange protocol
Information Processing Letters
ID-Based Group Password-Authenticated Key Exchange
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Fully Robust Tree-Diffie-Hellman Group Key Exchange
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
A secure and scalable Group Key Exchange system
Information Processing Letters
On security models and compilers for group key exchange protocols
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Secure mobile content delivery using dynamic group key agreement with batch verification
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
An efficient dynamic group key agreement protocol for imbalanced wireless networks
International Journal of Network Management
Generic one round group key exchange in the standard model
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Modeling leakage of ephemeral secrets in tripartite/group key exchange
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
A new security model for authenticated key agreement
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Identity-based authenticated asymmetric group key agreement protocol
COCOON'10 Proceedings of the 16th annual international conference on Computing and combinatorics
Dynamic asymmetric group key agreement for ad hoc networks
Ad Hoc Networks
On the minimum communication effort for secure group key exchange
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Contributory password-authenticated group key exchange with join capability
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Stronger security model of group key agreement
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
International Journal of Mobile Communications
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
Information Sciences: an International Journal
Security improvement on a group key exchange protocol for mobile networks
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part IV
Modeling key compromise impersonation attacks on group key exchange protocols
ACM Transactions on Information and System Security (TISSEC)
A non-malleable group key exchange protocol robust against active insiders
ISC'06 Proceedings of the 9th international conference on Information Security
An efficient dynamic group key agreement for low-power mobile devices
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Dynamic group key agreement in tree-based setting
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
A novel convinced diffie-hellman computation scheme and its cryptographic application
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Secure and efficient ID-based group key agreement fitted for Pay-TV
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
N-Party encrypted diffie-hellman key exchange using different passwords
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Efficient authenticated key agreement protocol for dynamic groups
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Practical and provably-secure multicasting over high-delay networks
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part II
Constant round dynamic group key agreement
ISC'05 Proceedings of the 8th international conference on Information Security
A flexible framework for secret handshakes
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Flexible group key exchange with on-demand computation of subgroup keys
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Password-Based group key exchange in a constant number of rounds
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Bridging broadcast encryption and group key agreement
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Mutual authentication and group key agreement for low-power mobile devices
Computer Communications
Group key agreement for secure group communication in dynamic peer systems
Journal of Parallel and Distributed Computing
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Future Generation Computer Systems
A new hierarchical and scalable group key exchange protocol with XOR operation
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
Authenticated Diffie-Hellman key exchange allows two principals communicating over a public network, and each holding public/ private keys, to agree on a shared secret value. In this paper we study the natural extension of this cryptographic problem to a group of principals. We begin from existing formal security models and refine them to incorporate major missing details (e.g., strong-corruption and concurrent sessions). With in this model we define the execution of a protocol for authenticated dynamic group Diffie-Hellman and show that it is provably secure under the decisional Diffie-Hellman assumption. Our security result holds in the standard model and thus provides better security guarantees than previously published results in the random oracle model.