참고문헌
- B.-M. Macq and J.-J. Quisquater, 'Cryptology for Digital TV Broadcasting,' Proc. of the IEEE, 83(6):944-57, 1995
- A. Fiat and M. Naor, 'Broadcast Encryption,' Advances in Cryptology-Crypto'93, LNCS 773, pp. 480-491, Springer Verlag, 1994
- C. Blundo, Luia A. Frota Mattos and D.R. Stinson, 'Generalized Beimel-Chor Schemes for Broadcast Encryption and Interactive Key Distribution,' Theoretical Computer Science, Vol. 200, pp. 313-334, 1998 https://doi.org/10.1016/S0304-3975(98)80007-8
- C. Blundo, Luia A. Frota Mattos and D. R. Stinson, 'Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution,' Advances in Cryptology-Crypto'96, LNCS 1109, pp. 387-400, 1996
- D. Lee, H. Kim and J. Lim, 'Efficient Public-Key Traitor Tracing in Provably Secure Broadcast Encryption with Unlimited Revocation Capability,' KoreaCrypto'02, 2003
- D. Boneh and M. Franklin, 'An Efficient Public-Key Traitor Tracing Scheme,' Crypto'99, LNCS 1666, pp. 338-353, 1999
- Y. Mu and V. Varadharajan, 'Robust and Secure Broadcasting,' Advances in Cryptology-Indocrypt'01, LNCS 2247, pp. 223-231, Springer-Verlag, 2001
- A. Wool, 'Key Management for Encrypted Broadcast,' Proc. of the 5th ACM conference on Computer and Communications Security, pp. 7-16, Springer-Verlag, 1998
- Y. Mu, W. Susilo and Y.-X. Lin, 'Identity-Based Broadcasting,' Advances in Cryptology-Indocrypt'03, LNCS 2904, pp. 177-190, Springer-Verlag, 2003
- A. Narayanan, C.P. Rangan, and K. Kim, 'Practical Pay TV schemes,' Proc. of the 9th Australasian Conference on Information Security and Privacy, LNCS 2727, pp. 192-203, Springer-Verlag, 2003
- A. Shamir, 'Identity-based Cryptosystems and Signature Schemes,' Advances in Cryptology-Crypto'84, LNCS 196, pp. 47-53, Springer-Verlag, 1984
- W. Diffie, P. van Oorschot, and M. Wiener, 'Authentication and Authenticated Key Exchanges,' Designs, Codes and Cryptography, 2(2):107-125, 1992 https://doi.org/10.1007/BF00124891
- G. Ateniese, M. Steiner, and G. Tsudik, 'New Multiparty Authentication Services and Key Agreement Protocols,' IEEE Journal on Selected Areas in Communications, 18(4):628-639, 2000 https://doi.org/10.1109/49.839937
- C. J. Mitchell, M. Ward, and P. Wilson, 'Key Control in Key Agreement Protocols,' Electronics Letters, 34(10):980-981, 1998 https://doi.org/10.1049/el:19980686
- I. Ingemarsson, D. Tang, and C. Wong, 'A Conference Key Distribution System,' IEEE Transactions on Information Theory, 28(5):714-720, 1982 https://doi.org/10.1109/TIT.1982.1056542
- G.H. Chiou and W.-T. Chen, 'Secure Broadcasting Using the Secure Lock,' IEEE Transactions on Software Engineering, 15(8):929-934, 1989 https://doi.org/10.1109/32.31350
- M. Burmester and Y. Desmedt, 'A Secure and Efficient Conference Key Distribution System,' Advances in Cryptology-Eurocrypt'94, LNCS 950, pp. 275-286, Springer-Verlag, 1994
- M. Just and S. Vaudenay, 'Authenticated Multi-party Key Agreement,' Advances in Cryptology-Asiacrypt'96, LNCS 1163, pp. 36-49, Springer-Verlag, 1996
- K. Becker and U. Wille, 'Communication Complexity of Group Key Distribution,' Proc. of 5th ACM Conference on Computer and Communications Security, pp. 1-6, Springer-Verlag, 1998
- Y. Kim, A. Perrig, and G. Tsudik, 'Simple and Fault-tolerant Key Agreement for Dynamic Collaborative Groups,' Proc. of 7st ACM Conference on Computer and Communications Security, pp. 235-244, Springer-Verlag, 2000
- M. Steiner, G. Tsudik, and M. Waidner, 'Key Agreement in Dynamic Peer Groups,' IEEE Transactions on Parallel and Distributed Systems, 11(8): 769-780, 2000 https://doi.org/10.1109/71.877936
- W.G. Tzeng and Z.J. Tzeng, 'Roundefficient Conference Key Agreement Protocols with Provable Security,' Advances in Cryptology-Asiacrypt'00, LNCS 1976, pp. 614-627, Springer-Verlag, 2000
- Y. Kim, A. Perrig, and G. Tsudik, 'Communication-efficient Group Key Agreement,' Proc. of International Fe deration for Information Processing, LNCS 1163, pp. 229-244, Springer-Verlag, 2001
- 박영호, 이경현, '이동네트워크 환경에서 그룹키 관리구조,' 정보보호학회논문지, 12(2), pp. 89-100, 2002
- 이상원, 천정희, 김용대, 'Pairing을 이용한 트리 기반 그룹키 합의 프로토콜,' 정보보호학회논문지, 13(3), pp. 101-110, 2003
- 박영희, 정병천, 이윤호, 김희열, 이재원, 윤현수, 'Diffie-Hallman 키 교환을 이용한 확장성을 가진 계층적 그룹키 설정 프로토콜,' 정보보호학회논문지, 13(5), pp. 3-15, 2003
- E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater, 'Provably Authenticated Group Diffie-Hellman Key Exchange,' Proc. of the 8st ACM Conference on Computer and Communications Security, pp. 255-264, Springer-Verlag, 2001
- E. Bresson, O. Chevassut, and D. Pointcheval, 'Provably Authenticated Group Diffie-Hellman Key Exchange the Dynamic Case,' Advances in Cryptology-Asiacrypt'01, LNCS 2248, pp. 290-309, Springer-Verlag, 2001
- E. Bresson, O. Chevassut, and D. Pointcheval, 'Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions,' Advances in Cryptology-Eurocrypt'02, LNCS 2332, pp. 321-336, Springer-Verlag, 2002
- C. Boyd and J.M.G. Nieto, 'Roundoptimal Contributory Conference Key Agreement,' Proc. of the 6th International Workshop on Practice and Theory in Public Key Cryptography, LNCS 2567, pp. 161-174, 2003
- J. Katze and M. Yung, 'Scalable Protocols for Authenticated Group Key Exchange,' Advances in Cryptology-Crypto'03, LNCS 2729, pp. 110-125, Springer-Verlag, 2003
- K.Y. Choi, J.Y. Hwang, and D.H. Lee, 'Efficient ID-based Group Key Agreement with Bilinear Maps,' Proc. of the 7th International Workshop on Practice and Theory in Public Key Cryptography, LNCS 2947, pp. 130-134, Springer-Verlag, 2004
- F. Zhang and X. Chen, 'Attack on Two ID-based Authenticated Group Key Agreement Schemes,' Cryptology ePrint Archive, Report 2003/256, available at iacr.org/2003/256/
- E. Bresson, O. Chevassut, A. Essiari and D. Pointcheval, 'Mutual authentication and group key agreement for low-power mobile devices,' Computer Communications, vol. 27(17), 2004, pp. 1730-1737, A preliminary version appeared in Proc. of the 5th IFIPTC6/IEEE International Conference on Mobile and Wireless Communications Networks (MWCN 03), pp. 59-62, 2003
- J. Nam, S. Kim and D. Won, 'An Attack on Bresson-Chevassut-Essiari-Pontcheval's Group Key Agreement Scheme for Low-Power Mobile Devices,' Cryptology ePrint Archive, Report 2004/251, available at iacr.org/2004/251/
- A. Joux, 'A One Round Protocol for Tripartite Diffie-Hellman,' In W. Bosma, editor, Proc. of Algorithmic Number Theory Symposium, LNCS 1838, pp. 385-394, Springer-Verlag, 2000
- D. Boneh and D. Franklin, 'Identity-Based Encryption from the Weil Pairing,' Proc. of Crypto'01, LNCS 2139, pp. 213-229, Springer-Verlag, 2001
- D. Bonech, B. Lynn, H. Shacham, 'Short Signatures from the Weil Pairing,' Advances in Cryptology-Asiacrypt' 01, Springer-Verlag, 2001
- D. Nalla and K.C. Reddy, 'Identity Based Authenticated Group Key Agree ment Protocol,' Proc. of Indocrypt'02, LNCS 2551, pp. 215-233, Springer-Verlag, 2002
- N.P. Smart. 'An Identity-based Authenticated Key Agreement Protocol based on the Weil Pairing,' Electronics Letters, 38(13):630-632, 2002 https://doi.org/10.1049/el:20020387
- F. Zhang, S. Liu and K. Kim, 'ID-based One Round Authenticated Tripartite Key Agreement Protocols with Pairings,' Cryptology ePrint Archive, Report 2002/122, available at iacr.org/2002/122/
- H. Kim, S. Kim, D. Won, 'ID-Based Partially Blind Signatre under GDH Group,' Proc. of the International Conference on Number Theory for Secure Communications 20th, pp. 159, 2003
- S. S. Al-Riyami, K. G. Paterson, 'Certificateless Public Key Cryptography,' Advances in Cryptology-Asiacrypt'03, LNCS 2784, Springer Verlag, 2003
- R. Barua, R. Dutta and P. Sarker, 'Extending Joux's Protocol to Multi Party Key Agreement,' Proc. of Indocrypt'03, LNCS 2904, pp. 205-217, Springer-Verlag, 2003
- J. Nam, S. Kim, S. Kim, and D. Won, 'Provably-secure and Communication- efficient Scheme for Dynamic Group Key Exchange,' Cryptology ePrint Archive, Report 2004/115, available at iacr.org/2004/115/
- J. Nam, J. Lee, S. Kim, and D. Won, 'DDH-based Group Key Agreement for Mobile Computing,' Cryptology e-Print Archive, Report 2004/127, available at iacr.org/2004/127/
- J. Cheon, Y. Kim, and H. Yoon, 'A New ID-based Signature with Batch Verification,' Cryptology ePrint Archive, Report 2004/131, available at iacr.org/2004/131/