1 |
S. B. Wilson, D. Johnson, and A. Menezes, "Key agreement protocols and their security analysis," in Proc. IMA Int. Conf. Cryptography Coding, LNCS, 1998, vol. 1355, pp. 30-45.
|
2 |
P. Barreto, H. Y. Kim, B. Lynn, and M. Scott, "Effiecient algorithms for pairing-based cryptosystems," in Proc. Crypto Conf., Aug. 2002, pp. 354- 369.
|
3 |
C. Lin, "Secure one-round tripartite authenticated key agreement protocol from Weil pairing," in Proc. AINA, Mar. 2005, pp. 135-138.
|
4 |
A. J. Menezes, Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, 1993.
|
5 |
S. Yen, "Cryptanalysis of an authentication and key distribution protocol," IEEE Commun. Letters, vol. 3, no. 1, pp. 7-8, Jan. 1999.
DOI
|
6 |
C. Zhang and Y. Zhang, "New ID-based and threshold key distribution protocol in MANET using a multi-signcryption scheme," in Proc. CIS, Dec. 2009, pp. 392-396.
|
7 |
L. Zheng, Z. Han, R. Zhang, and T. Fan, "Authenticated key distribution protocol in universal network," in Proc. ICFIN, 2009, pp. 201-208.
|
8 |
G. Ateniese, M. Steiner, and G. Tsudik, "New multiparty authentication services and key agreement protocols," IEEE J. Sel. Areas Commun., vol. 18, no. 4, pp. 628-639, Apr. 2000.
DOI
|
9 |
R. Barua, R. Dutta, and P. Sarkar, "Extending Joux's protocol to multi party key agreement," in Proc. INDOCRYPT, LNCS, Springer Berlin, 2003, vol. 2904, pp. 205-217.
|
10 |
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
DOI
|
11 |
A. Joux, "A one round protocol for tripartite Diffie-Hellman," in Proc. ANTS, LNCS, Springer-Verlag, 2000, vol. 1838, pp. 385-394.
|
12 |
Y. Kim, A. Perrig, and G. Tsudik, "Group key agreement efficient in communication," IEEE Trans. Comput., vol. 53, no. 7, pp. 905-921, July 2004.
DOI
ScienceOn
|
13 |
L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone, "An efficient protocol for authenticated key agreement," Univ. of Watreloo, Tech. Rep., 1998.
|
14 |
M. Steiner, G. Tsudik, and M. Waidner, "Key agreement in dynamic peer groups," IEEE Trans. Parallel Distrib. Syst., vol. 11, no. 8, pp. 769-780, Aug. 2000.
DOI
ScienceOn
|
15 |
W. Tzeng, "A secure fault-tolerant conference-key agrement protocol," IEEE Trans. Comput., vol. 51, no. 4, pp. 373-379, Apr., 2002.
DOI
ScienceOn
|
16 |
H. Wang, G. Yao, and Q. Jiang, "An identity-based group key agreement protocol from pairing," in Proc. ARES, Mar. 2008, pp. 532-537.
|
17 |
X. Yi, "Identity-based fault-tolerant conference key agreement," IEEE Trans. Dependable Secure Comput., vol. 1, no. 3, pp. 170-178, 2004.
DOI
ScienceOn
|
18 |
D. Boneh and M. Franklin, "Identity-based encryption from Weil pairing," in Proc. In Advances in Cryptology-CRYPTO, LNCS, Aug. 2001, vol. 2139, pp. 213-229.
|
19 |
A. J. Menezes, T. Okamoto, and S. Vanstone, "Reducing elliptic curve logarithms to logarithms in a finite field," IEEE Trans. Inf. Theory, vol. 39, no. 5, pp. 1639-1646, Sept. 1993.
DOI
ScienceOn
|
20 |
H. Silverman, The Arithmetic of Elliptic Curves. 2nd ed., Springer, 2000.
|
21 |
O. Lee, S. Yoo, B. Park, and I. Chung, "The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block cesign," Inf. Sci., vol. 176, pp. 2148-2160, 2006.
DOI
ScienceOn
|
22 |
C. Liu, Introduction to Combinatorial Mathematics. McGraw-Hill, New York, 1968.
|
23 |
W. Stallings, Cryptography and Network Security. 4th ed., Prentice Hall, 2005.
|
24 |
M. Adeel, M. Hussain, U. Beenish, S. Mehwish, L. Tokarchuk, and A. Shahzad, "Identifier based key eistribution protocol for wireless sensor networks," in Proc. SoftCOM, 2008, pp. 169-173.
|
25 |
M. Steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman key distribution extended to groups," in Proc. ACM Conf. Computer Commun. Security, Mar. 1996, pp. 31-37.
|
26 |
K. Becker and U. Wille, "Communication complexity of group key distribution," in Proc. ACM Conf. Computer Commun. Security, Mar. 1998, pp. 1-6.
|
27 |
M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system," in Proc. Advances in Cryptology-EUROCRYPT, LNCS, 1995, vol. 950, pp. 275-286.
|
28 |
I. Ingemarsson, D. Tang, and C. Wong, "A conference key distribution system," IEEE Trans. Inf. Theory, vol. 28, no. 5, pp. 714-720, Sept. 1982.
DOI
|