[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

A survey of group key agreement protocols with constant rounds

H Xiong, Y Wu, Z Lu - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Group key agreement (shorten as GKA) protocol enables a group of users to negotiate a one-
time session key and protect the thereafter group-oriented communication with this session …

Provably secure constant round contributory group key agreement in dynamic setting

R Dutta, R Barua - IEEE Transactions on Information Theory, 2008 - ieeexplore.ieee.org
In this paper, we present and analyze a variant of Burmester-Desmedt group key agreement
protocol (BD) and enhance it to dynamic setting where a set of users can leave or join the …

Constant-round authenticated and dynamic group key agreement protocol for D2D group communications

L Wang, Y Tian, D Zhang, Y Lu - Information Sciences, 2019 - Elsevier
The device-to-device (D2D) communication exhibits its potential capacity in the next
generation of mobile communication networks and wireless systems (5G). One of the most …

Key management scheme for secure channel establishment in fog computing

L Zhang - IEEE Transactions on Cloud Computing, 2019 - ieeexplore.ieee.org
Fog computing is a promising extension of cloud computing, and enables computing directly
at the edge of the network. Due to the decentralized and distributed nature of fog nodes …

Password-based group key exchange in a constant number of rounds

M Abdalla, E Bresson, O Chevassut… - Public Key Cryptography …, 2006 - Springer
With the development of grids, distributed applications are spread across multiple computing
resources and require efficient security mechanisms among the processes. Although …

Secure group key establishment revisited

JM Bohli, MI González Vasco, R Steinwandt - International Journal of …, 2007 - Springer
We examine the popular proof models for group key establishment of Bresson et al.(LNCS
2248: 290–309, 2001; Proceedings of the 8th ACM conference on computer and …

Modeling key compromise impersonation attacks on group key exchange protocols

MC Gorantla, C Boyd, JMG Nieto… - ACM Transactions on …, 2008 - dl.acm.org
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various
models considering different adversarial actions. However, the analysis of group key …

Provably secure one-round identity-based authenticated asymmetric group key agreement protocol

L Zhang, Q Wu, B Qin, J Domingo-Ferrer - Information sciences, 2011 - Elsevier
The newly introduced notion of asymmetric group key agreement (AGKA) enables external
users to securely send messages to group members. The existing AGKA is only secure …

SoK: Game-based security models for group key exchange

B Poettering, P Rösler, J Schwenk, D Stebila - Cryptographers' Track at the …, 2021 - Springer
Group key exchange (GKE) protocols let a group of users jointly establish fresh and secure
key material. Many flavors of GKE have been proposed, differentiated by, among others …