Zero-knowledge undeniable signatures (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Specifying and using a partitionable group communication service
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Communication complexity of group key distribution
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Authenticated group key agreement and friends
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Provably authenticated group Diffie-Hellman key exchange
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Key Management for Secure Multicast with Dynamic Controller
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
A Secure Audio Teleconference System
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Communication-Efficient Group Key Agreement
IFIP/Sec '01 Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge
Efficient and Secure Conference-Key Distribution
Proceedings of the International Workshop on Security Protocols
The Decision Diffie-Hellman Problem
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
DISEC: A Distributed Framework for Scalable Secure Many-to-Many Communication
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
Lower bounds for discrete logarithms and related problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Using hash functions as a hedge against chosen ciphertext attack
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
Optimistic fair exchange of digital signatures
IEEE Journal on Selected Areas in Communications
On the performance of group key agreement protocols
ACM Transactions on Information and System Security (TISSEC)
Energy-efficient and scalable group key agreement for large ad hoc networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Secure Spread: An Integrated Architecture for Secure Group Communication
IEEE Transactions on Dependable and Secure Computing
Low-power group key agreement for heterogeneous wireless networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Distributed collaborative key agreement and authentication protocols for dynamic peer groups
IEEE/ACM Transactions on Networking (TON)
SEAL: A secure communication library for building dynamic group key agreement applications
Journal of Systems and Software
A communication-computation efficient group key algorithm for large and dynamic groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
Chinese remainder theorem based group key management
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
Tree-based group key agreement framework for mobile ad-hoc networks
Future Generation Computer Systems
Information Sciences: an International Journal
Improved ID-based security framework for ad hoc network
Ad Hoc Networks
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes
IEEE Transactions on Dependable and Secure Computing
Performance optimization of region-based group key management in mobile ad hoc networks
Performance Evaluation
Low-power authenticated group key agreement for heterogeneous wireless networks
International Journal of Security and Networks
Securing group key exchange against strong corruptions
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Secure communication for ad-hoc, federated groups
Proceedings of the 7th symposium on Identity and trust on the Internet
Offering data confidentiality for multimedia overlay multicast: Design and analysis
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Effective Key Management Protocol for Extremely Self-Motivated Environment
Information Systems Management
Securing group key exchange against strong corruptions and key registration attacks
International Journal of Applied Cryptography
A heterogeneity-aware framework for group key management in wireless mesh networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Constructing UC secure and constant-round group key exchange protocols via secret sharing
EURASIP Journal on Wireless Communications and Networking
Group Key Management: From a Non-hierarchical to a Hierarchical Structure
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Securing publish/subscribe for multi-domain systems
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
Usable secure mailing lists with untrusted servers
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Secure and Efficient Group Key Agreements for Cluster Based Networks
Transactions on Computational Science IV
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
International Journal of Security and Networks
Group key management in wireless mesh networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Fully Robust Tree-Diffie-Hellman Group Key Exchange
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Design of efficient ternary-tree based group key agreement protocol for dynamic groups
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Key agreement for heterogeneous mobile ad-hoc groups
International Journal of Wireless and Mobile Computing
A tree key graph design scheme for hierarchical multi-group access control
IEEE Communications Letters
ECGK: An efficient clustering scheme for group key management in MANETs
Computer Communications
DLPKH - distributed logical public-key hierarchy
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Scalable authenticated tree based group key exchange for ad-hoc groups
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Secure group key agreement protocol based on chaotic Hash
Information Sciences: an International Journal
EGSI: TGKA Based Security Architecture for Group Communication in Grid
CCGRID '10 Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing
Secure communication between grid domains based on trust relationships and group keys
International Journal of Communication Networks and Distributed Systems
Efficient cluster-based group key agreement protocols for wireless ad hoc networks
Journal of Network and Computer Applications
A key management scheme for secure group communication using binomial key trees
International Journal of Network Management
Securing communication of dynamic groups in dynamic network-centric environments
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Energy-efficient ID-based group key agreement protocols for wireless networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
A novel group key agreement protocol for wireless mesh network
Computers and Electrical Engineering
Efficient key distribution for closed meetings in the internet
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Private notes: encrypted XML notes synchronization and sharing with untrusted web services
Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services
Secure group communication with low communication complexity
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Linkable democratic group signatures
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Pseudonym generation scheme for ad-hoc group communication based on IDH
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Flexible group key exchange with on-demand computation of subgroup keys
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Authenticated group key agreement for multicast
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Security weakness in ren et al.'s group key agreement scheme built on secure two-party protocols
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Securing publish/subscribe for multi-domain systems
Middleware'05 Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
Bridging broadcast encryption and group key agreement
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Group key agreement for secure group communication in dynamic peer systems
Journal of Parallel and Distributed Computing
Decentralized dynamic broadcast encryption
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
A communication efficient group key distribution scheme for MANETs
NSS'12 Proceedings of the 6th international conference on Network and System Security
COMPASS: authenticated group key agreement from signcryption
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Secure group key management scheme based on dual receiver cryptosystem
Proceedings of the first ACM workshop on Asia public-key cryptography
SafeSlinger: easy-to-use and secure public-key exchange
Proceedings of the 19th annual international conference on Mobile computing & networking
Fast transmission to remote cooperative groups: a new key management paradigm
IEEE/ACM Transactions on Networking (TON)
Autonomous Shared Key Management Scheme for Space Networks
Wireless Personal Communications: An International Journal
High Performance Group Merging/Splitting Scheme for Group Key Management
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Secure and reliable group communication is an active area of research. Its popularity is fueled by the growing importance of group-oriented and collaborative applications. The central research challenge is secure and efficient group key management. While centralized methods are often appropriate for key distribution in large multicast-style groups, many collaborative group settings require distributed key agreement techniques. This work investigates a novel group key agreement approach which blends key trees with Diffie--Hellman key exchange. It yields a secure protocol suite called Tree-based Group Diffie--Hellman (TGDH) that is both simple and fault-tolerant. Moreover, the efficiency of TGDH appreciably surpasses that of prior art.