1 |
J. Nam, S. Kim, and D. Won, 'Secure group communications over combined wired and wireless networks,' in Proc. 2nd Int. Conf. on Trust, Privacy, and Security in Digital Business, 2005, vol. 3592, LNCS, pp. 90-99
|
2 |
M. Bellare, D. Pointcheval, and P. Rogaway, 'Authenticated key exchange secure against dictionary attacks,' in Proc. Eurocrypt 2000, LNCS, vol. 1807, 2000, pp. 139-155
|
3 |
J. Katz and J. S. Shin, 'Modeling insider attacks on group key-exchange protocols,' in Proc. 12th ACM Conf. Computer and Commun. Security, 2005, pp. 180-189
|
4 |
J. Katz, R. Ostrovsky, and M. Yung, 'Efficient password-authenticated key exchange using human-memorable passwords,' in Proc. Eurocrypt 2001, LNCS, vol. 2045, 2001, pp.475-494
|
5 |
E. Bresson, O. Chevassut, and D. Pointcheval, 'Dynamic group Diffie-Hellman key exchange under standard assumptions,' in Proc. Eurocrypt 2002, LNCS, vol. 2332, 2002, pp. 321-336
|
6 |
N. Borisov, I. Goldberg, and D. Wagner, 'Intercepting mobile communications: the insecurity of 802.11,' in Proc. 7th ACM Conf. Mobile Computing and Networking, 2001, pp. 180-189
|
7 |
D. Johnston and J. Walker, 'Overview of IEEE 802.16 security,' IEEE Security Privacy, vol. 2, no. 3, pp. 40-48, 2004
|
8 |
S.-L. Ng and C. Mitchell, 'Comments on mutual authentication and key exchange protocols for low power wireless communications,' IEEE Commun. Lett., vol. 8, no. 4, pp. 262-263, 2004
DOI
ScienceOn
|
9 |
M. Steiner, G. Tsudik, and M. Waidner, 'Key agreement in dynamic peer groups,' IEEE Trans. Parallel Distrib. Syst., vol. 11, no. 8, pp. 769-780, 2000
DOI
ScienceOn
|
10 |
E. Bresson, O. Chevassut, and D. Pointcheval, 'Group Diffie-Hellman key exchange secure against dictionary attacks,' in Proc. Asiacrypt 2002, LNCS, vol. 2501, 2002, pp. 497-514
|
11 |
Y. Amir, Y. Kim, C. Nita-Rotaru, and G. Tsudik, 'On the performance of group key agreement protocols,' ACM Trans. Inform. Syst. Security, vol. 7, no.3, pp.457-488, 2004
DOI
|
12 |
E. Bresson, O. Chevassut, A. Essiari, and D. Pointcheval, 'Mutual authentication and group key agreement for low-power mobile devices,' Comput. Commun., vol. 27, no. 17, pp. 1730-1737, 2004
DOI
ScienceOn
|
13 |
Q. Tang and K.-K. R. Choo, 'Secure password-based authenticated group key agreement for data-sharing peer-to-peer networks,' in Proc. 4th Int. Conf. Applied Crypto. and Network Security, LNCS, vol. 3989, 2006, pp.162-177
|
14 |
S. Goldwasser and S. Micali, 'Probabilistic encryption,' J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, 1984
DOI
ScienceOn
|
15 |
M. Burmester and Y. Desmedt, 'A secure and efficient conference key distribution system,' in Proc. Eurocrypt 1994, LNCS, vol. 950, 1994, pp. 275-286
|
16 |
D. Wallner, E. Harder, and R. Agee, 'Key management for multicast: issues and architectures,' RFC 2627, IETF, 1999
|
17 |
R. Canetti and H. Krawczyk, 'Analysis of key-exchange protocols and their use for building secure channels,' in Proc. Eurocrypt 2001, 2001, LNCS, vol. 2045, pp. 453-474
|
18 |
W. Diffie, P. Oorschot, and M. Wiener, 'Authentication and authenticated key exchanges,' Des., Codes, Crypto., vol. 2, no. 2, pp. 107-125, 1992
DOI
|
19 |
Y. Kim, A. Perrig, and G. Tsudik, 'Group key agreement efficient in communication,' IEEE Trans. Comput., vol. 53, no. 7, pp. 905-921, 2004
DOI
ScienceOn
|
20 |
H.-J. Kim, S.-M. Lee, and D. H. Lee, 'Constant-round authenticated group key exchange for dynamic groups,' in Proc. Asiacrypt 2004, LNCS, vol. 3329, 2004, pp.245-259
|
21 |
D. Denning and G. Sacco, 'Timestamps in key distribution protocols,' Commun. ACM, vol. 24, no. 8, pp. 533-536, 1981
DOI
|
22 |
R. Dutta and R. Barna, 'Constant round dynamic group key agreement,' in Proc. 8th Inform. Security Conf., LNCS, vol. 3650, 2005, pp. 74-88
|
23 |
J. Herranz and J. L. Villar, 'An unbalanced protocol for group key exchange,' in Proc. 1st Int. Conf. Trust, Privacy, and Security in Digital Business, LNCS, vol. 3184, 2004, pp. 172-180
|
24 |
A. O. Freier, P. Karlton, and P. C. Kocher, 'The SSL protocol version 3.0,' Internet draft, Netscape Communications, 1996
|
25 |
M. Bellare and P. Rogaway, 'Entity authentication and key distribution,' in Proc. Crypto'93, 1993, LNCS, vol. 773, pp. 232-249
|
26 |
S. Kent and R. Atkinson, 'Security architecture for the Internet protocol,' RFC 2401, 1998
|
27 |
E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater, 'Provably authenticated group Diffie-Hellman key exchange,' in Proc. 8th ACM Conf. Computer and Commun. Security, 2001, pp. 255-264
|
28 |
K.-K. R. Choo, 'Refuting security proofs for tripartite key exchange with model checker in planning problem setting,' in Proc. 19th IEEE Computer Security Foundations Workshop, 2006, pp. 297-308
|
29 |
J. Katz and M. Yung, 'Scalable protocols for authenticated group key exchange,' in Proc. Crypto 2003, LNCS, vol. 2729, 2003, pp. 110-125
|
30 |
R. Canetti and H. Krawczyk, 'Universally composable notions of key exchange and secure channels,' in Proc. Eurocrypt 2002, LNCS, vol. 2332, 2002, pp. 337-351
|
31 |
K. Becker and U. Wille, 'Communication complexity of group key distribution,' in Proc. 5th ACM Conf. Computer and Commun. Security, 1998, pp.1-6
|
32 |
S. M. Bellovin and M. Merritt, 'Encrypted key exchange: Password-based protocols secure against dictionary attacks,' in Proc. IEEE Symp. Security and Privacy, 1992, pp. 72-84
|
33 |
C. Wong, M. Gouda, and S. Lam, 'Secure group communications using key graphs,' in Proc. ACM SIGCOMM'98, 1998, pp. 68-79
|
34 |
I. Ingemarsson, D. Tang, and C. Wong, 'A conference key distribution system,' IEEE Trans. Inform. Theory, vol. 28, no. 5, pp. 714-720, 1982
DOI
|
35 |
H. Krawczyk, 'HMQV: A high-performance secure Diffie-Hellman protocol,' in Proc. Crypto 2005, LNCS, vol. 3621, 2005, pp. 546-566
|
36 |
J. Nam, S. Kim, and D. Won, 'A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices,' IEEE Commun. Lett., vol. 9, no. 5, pp. 429-431, 2005
DOI
ScienceOn
|
37 |
A. Joux, 'A one round protocol for tripartite Diffie-Hellman,' J. Crypto., vol. 17, no.4, pp.263-276, 2003
|
38 |
K.-K. R. Choo, 'Provably-secure mutual authentication and key establishment protocols lounge,' 2006, available at http://sky.fit.qut.edu.au/-choo/lounge.html
|
39 |
W.-G. Tzeng and Z.-J. Tzeng, 'Round-efficient conference key agreement protocols with provable security,' in Proc. Asiacrypt 2000, LNCS, vol. 1976, 2000, pp. 614-627
|
40 |
Y. Kim, A. Perrig, and G. Tsudik, 'Tree-based group key agreement,' ACM Trans. Inform. Syst. Security, vol. 7, no. 1, pp. 60-96, 2004
DOI
|
41 |
M. Abdalla, P.-A. Fouque, and D. Pointcheval, 'Password-based authenticated key exchange in the three-party setting,' in Proc. 8th Int. Workshop Practice and Theory in Public Key Crypto., LNCS, vol. 3386, 2005, pp.65-84
|
42 |
C. Boyd and J.M.G. Nieto, 'Round-optimal contributory conference key agreement,' in Proc. 6th Int. Workshop Practice and Theory in Public Key Crypto., LNCS, vol. 2567, 2003, pp. 161-174
|
43 |
J. Nam, J. Lee, S. Kim, and D. Won, 'DDH-based group key agreement in a mobile environment,' J. Syst. Softw., vol. 78, no. 1, pp. 73-83, 2005
DOI
ScienceOn
|
44 |
V. Shoup, 'On formal models for secure key exchange,' Cryptology ePrint Archive, Report 1999/012, 1999, available at http://eprint.iacr.org/1999/012
|
45 |
B. Blanchet, 'A computationally sound mechanized prover for security protocols,' in Proc. IEEE Symp. Security and Privacy, 2006, pp. 140-154
|
46 |
N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, 'Analyzing the energy consumption of security protocols,' in Proc. ACM Int. Symp. Low Power Electron. and Des., 2003, pp. 30-35
|
47 |
W. Diffie and M. E. Hellman, 'New directions in cryptography,' IEEE Trans. Inform. Theory, vol. 22, no. 6, pp. 644-654, 1976
DOI
|
48 |
E. Bresson, O. Chevassut, and D. Pointcheval, 'Provably authenticated group Diffie-Hellman key exchange-the dynamic case,' in Proc. Asiacrypt 2001, LNCS, vol. 2248, 2001, pp. 290-309
|
49 |
K.-K. R. Choo, C. Boyd, and Y. Hitchcock, 'Errors in computational complexity proofs for protocols,' in Proc. Asiacrypt 2005, LNCS, vol. 3788, 2005, pp. 624-643
|
50 |
M. Bellare and P. Rogaway, 'Random oracles are practical: A paradigm for designing efficient protocols,' in Proc. 1st ACM Conf. Computer and Commun. Security, 1993, pp. 62-73
|
51 |
G. Ateniese, M. Steiner, and G. Tsudik, 'New multiparty authentication services and key agreement protocols,' IEEE J. Select. Areas Commun., vol. 18, no.4, pp.628-639, 2000
DOI
ScienceOn
|
52 |
E. Okamoto and K. Tanaka, 'Key distribution system based on identification information,' IEEE J. Select. Areas Commun., vol. 7, no. 4, pp. 481-485, 1989
DOI
ScienceOn
|
53 |
M. Bellare and P. Rogaway, 'Provably secure session key distribution-the three party case,' in Proc. 27th ACM Symp. Theory of Computing, 1995, pp.57-66
|
54 |
E. Bresson and D. Catalano, 'Constant round authenticated group key agreement via distributed computation,' in Proc. 7th Int. Workshop on Practice and Theory in Public Key Crypto., LNCS, vol. 2947, 2004, pp. 115-129
|
55 |
M. Abdalla, E. Bresson, O. Chevassut, and D. Pointcheval, 'Password-based group key exchange in a constant number of rounds,' in Proc. 9th Int. Workshop Practice and Theory in Public Key Crypto., LNCS, vol. 3958, 2006, pp. 427-442
|
56 |
A. Perrig, D. Song, and J.D. Tygar, 'ELK, a new protocol for efficient large-group key distribution,' in Proc. IEEE Symp. Security and Privacy, 2001, pp. 247-262
|
57 |
O. Pereira and J.-J. Quisquater, 'A security analysis of the Cliques protocols suites,' in Proc. 14th IEEE Computer Security Foundations Workshop, 2001, pp.73-81
|
58 |
G. Horn, K. M. Martin, and C. J. Mitchell, 'Authentication protocols for mobile network environment value-added services,' IEEE Trans. Veh. Technol., vol. 51, no. 2, pp. 383-392, 2002
DOI
ScienceOn
|