Sciweavers

90 search results - page 1 / 18
» Asymmetric Group Key Agreement
Sort
View
COCOON
2010
Springer
13 years 9 months ago
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key crypt...
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferr...
EUROCRYPT
2009
Springer
14 years 4 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
GLOBECOM
2007
IEEE
13 years 10 months ago
Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups
A Group Key Agreement protocol is a process to establish a cryptographic key for a group of participants over an open network. In this paper, we propose a group key agreement(CAGKA...
Sungchul Heo, Zeen Kim, Kwangjo Kim
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
13 years 8 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
JCS
2006
74views more  JCS 2006»
13 years 4 months ago
On the impossibility of building secure Cliques-type authenticated group key agreement protocols
The A-GDH.2 and SA-GDH.2 authenticated group key agreement
Olivier Pereira, Jean-Jacques Quisquater