Sciweavers

281 search results - page 6 / 57
» Scalable Protocols for Authenticated Group Key Exchange
Sort
View
ATC
2007
Springer
15 years 3 months ago
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
Emmanuel Bresson, Mark Manulis
CSREASAM
2006
14 years 11 months ago
Enhanced Group Key Generation Protocol
Group communication is becoming increasingly popular in Internet applications such as videoconferences, online chatting programs, games, and gambling. For secure communications, th...
Sunghyuck Hong, Noé Lopez-Benitez
ASIACRYPT
2000
Springer
15 years 1 months ago
Password-Authenticated Key Exchange Based on RSA
Abstract. There have been many proposals in recent years for passwordauthenticated key exchange protocols. Many of these have been shown to be insecure, and the only ones that seem...
Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
CCS
2001
ACM
15 years 2 months ago
Provably authenticated group Diffie-Hellman key exchange
Emmanuel Bresson, Olivier Chevassut, David Pointch...
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
15 years 2 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee