1 |
K. Y. Choi, J. Y. Hwang, and D. H. Lee, "Efficient ID-based group key agreement with bilinear maps," International Workshop on Practice and Theory in Public Key Cryptography (PKC2004, IACR), pp.1-14, 2004.
|
2 |
X. Du, Y. Wang, J. Ge, and Y. Wang, "An ID-based authenticated two round multiparty key agreement," IACR ePrint 2003-247, 2003.
|
3 |
M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system," Advances in Cryptology-EURO- CRYPT94, LNCS, pp.950, 1995.
|
4 |
F. Zhang and X. Chen, "Attack on ID-based authenticated group key agreement schemes," IACR ePrint 2003-259, 2003.
|
5 |
X. Du, Y. Wang, J. Ge, and Y. Wang, "An Improved ID-based authenticated group key agreement scheme," IACR ePrint 2003-260, 2003.
|
6 |
Y. Shi, G. Chen, and J. Li, "ID-based one round authenticated group key agreement protocol with bilinear pairings," Proc. ITCC'05. Vol. 1, pp. 757-761, 2005.
|
7 |
Y. Z. He and Z. Han, "An Efficient Authenticated Group key agreement protocol," Security Technology, IEEE International Carnahan Conference, pp.250-254, 2007.
|
8 |
X. Chen, F. Zhang, and K. Kim, "A new ID-based group signature scheme from bilinear pairings," IACR ePrint 2003-116, 2003.
|
9 |
K. K. R. Choo, "Revisit of McCullagh- Barreto two-party ID- based authenticated key agreement Protocols," International journal of network security, pp.154-160, Nov. 2005.
|
10 |
A. Shamir, "Identity-based cryptosystems and signature schemes," Advances in Cryptology- Crypto LNCS 196, pp.47-53, 1984.
|
11 |
D. Boneh and M. Franklin, "Identitybased encryption from the Weil pairing," Advances in Cryptology- Crypto LNCS 2139, pp.213-229, 2001.
|