Provably secure constant round contributory group key agreement in dynamic setting

R Dutta, R Barua - IEEE Transactions on Information Theory, 2008 - ieeexplore.ieee.org
In this paper, we present and analyze a variant of Burmester-Desmedt group key agreement
protocol (BD) and enhance it to dynamic setting where a set of users can leave or join the …

Securing group key exchange against strong corruptions

E Bresson, M Manulis - Proceedings of the 2008 ACM symposium on …, 2008 - dl.acm.org
When users run a group key exchange (GKE) protocol, they usually extract the key from
some auxiliary (ephemeral) secret information generated during the execution. Strong …

Constant round dynamic group key agreement

R Dutta, R Barua - Information Security: 8th International Conference, ISC …, 2005 - Springer
We present a fully symmetric constant round authenticated group key agreement protocol in
dynamic scenario. Our proposed scheme achieves forward secrecy and is provably secure …

TJET: Ternary join-exit-tree based dynamic key management for vehicle platooning

C Xu, R Lu, H Wang, L Zhu, C Huang - IEEE Access, 2017 - ieeexplore.ieee.org
Vehicle platooning, which is formed by a group of vehicles traveling in close proximity to one
another, nose-to-tail, at highway speeds, has received considerable attention in recent …

Dynamic group key agreement in tree-based setting

R Dutta, R Barua - Australasian Conference on Information Security and …, 2005 - Springer
We present a provably secure tree based authenticated group key agreement protocol in
dynamic scenario. Bilinear pairing and multi-signature are at the heart of our protocol. We …

Overview of key agreement protocols

R Dutta, R Barua - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Overview of Key Agreement Protocols 1 Introduction Page 1 Overview of Key Agreement
Protocols Ratna Dutta and Rana Barua Stat-Math Unit Indian Statistical Institute 203, BT Road …

A provably secure cluster-based hybrid hierarchical group key agreement for large wireless ad hoc networks

VS Naresh, S Reddi, NVES Murthy - Human-centric Computing and …, 2019 - Springer
Group key agreement protocol permits a set of users to create a common key to make sure
security of information exchange among members of the group. It is extensively used in …

On security models and compilers for group key exchange protocols

E Bresson, M Manulis, J Schwenk - … on Security, IWSEC 2007, Nara, Japan …, 2007 - Springer
Group key exchange (GKE) protocols can be used to guarantee confidentiality and
authentication in group applications. The paradigm of provable security subsumes an …

Further analysis of ID-based authenticated group key agreement protocol from bilinear maps

KA Shim - IEICE transactions on fundamentals of electronics …, 2007 - search.ieice.org
Recently, Choi et al. proposed an ID-based authenticated group key agreement with bilinear
maps. Subsequently, Zhang and Chen showed that the protocol does not provide …

Malicious participants in group key exchange: key control and contributiveness in the shadow of trust

E Bresson, M Manulis - … Conference on Autonomic and Trusted Computing, 2007 - Springer
Group key exchange protocols allow their participants to compute a secret key which can be
used to ensure security and privacy for various multi-party applications. The resulting group …