[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/288090.288097acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article
Free access

Authenticated group key agreement and friends

Published: 01 November 1998 Publication History
First page of PDF

References

[1]
R. Anderson and S. Vaudenay. Minding your p's and q's. In Advances in Cryptology- Asiacrypt'96, 1996.
[2]
C. Becket and U. WilIe. Communication complexity of group key distribution. In A CM Conference on Computer and Communication Security, November 1998.
[3]
M. Bellare, R. Canetti, and H. Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols. In A CM Symposium on Theory of Computing, 1998.
[4]
M. Bellare and P. Rogaway. Entity authentication and key distribution. In Advances in Uryptology - URYPTO, 1993.
[5]
M. Burmester. On the risk of opening distributed keys. In Advances in Cryptology - CRYPTO, 1994.
[6]
M. Burmester and Y. Desmedt. Towards practical proven secure authenticated key distribution. In A CM Conference on Computer and Communication Security, 1993.
[7]
M. Burmester and Y. Desmedt. A secure and efficient conference key distribution system. In Advances in Cryptology - EUROURYPT, 1994.
[8]
M. Buxmester and Y. Desmedt. Efficient and secure conference key distribution. In Cambridge Workshop on Security Protocols, volume 1189 of Lecture Notes in Computer Science, pages 119-129. Springer-Verlag, Berlin Germany, April 1996.
[9]
R. Canetti. Studies in secure multiparty computation and applications. PhD Thesis, Dept. of Computer Science and Applied Mathematics, Weizmann Institute of Science, May 1995.
[10]
D. Chaum, C. Crepeau, and I. Damgaard. Multiparty unconditionalsecure protocols. In A UM Symposium on Theory of Computing, 1988.
[11]
W. Diffie and M. HeUman. New directions in cryptography. IEEE Transactions on Informatio~ Theory, IT-22(6):644- 654, November 1976.
[12]
N. Koblitz. A Course in Number Theory and Cryptography. Springer-Verlag, Berlin Germany, Berlin, 1987.
[13]
NIST Computer Systems Laboratory. Digital signature standard (draft). FIPS PUB 186, May 1994.
[14]
NIST Computer Systems Laboratory. Secure hash standard (draft). FIPS PUB 180-1, May 1994.
[15]
C. Hoon Lira and P. Joong Lee. A key recovery attack on discrete log-based schemes using a prime order subgroup. In Advances in Cryptolofly- CRYPTO, 1997.
[16]
N. Lynch. Distributed algorithms. Morgan Kaufmann, San Francisco 1996.
[17]
T. Matsumoto, Y. Takashima, and H. Imai. On seeking smart public-key-distribution systems. Transactions of ~he IECE, E69, 1986.
[18]
A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of applied cryptography. CRC Press series on discrete mathematics and its applications. CRC Press, 1996. ISBN 0-8493- 8523-7.
[19]
J. Smith and F. Weingarten. Res.earch challenges for the next generation intemet, May 1997. Report from the Workshop on Research Directions for NGI.
[20]
M. Steiner, G. Tsudik, and M. Waidner. Diflle-hellman key distribution extended to groups. In A CM Conference on Computer and Communication Security, pages 31-37, March 1996.
[21]
M. Steiner, G. Tsudik, and M. Waidner. CLIQUES: A new approach to group key agreement. In IEEE International Conference on Distributed Computing Systems, May 1998.

Cited By

View all
  • (2024)BGKey: Group Key Generation for Backscatter Communications Among Multiple DevicesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334565019(2470-2486)Online publication date: 2024
  • (2024)Discreet: distributed delivery service with context-aware cooperationAnnals of Telecommunications10.1007/s12243-024-01053-1Online publication date: 11-Jul-2024
  • (2023)Design of an Efficient Distributed Delivery Service for Group Key Agreement ProtocolsFoundations and Practice of Security10.1007/978-3-031-57537-2_25(408-423)Online publication date: 11-Dec-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '98: Proceedings of the 5th ACM conference on Computer and communications security
November 1998
160 pages
ISBN:1581130074
DOI:10.1145/288090
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 1998

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

5CCS98
Sponsor:
5CCS98: 5th ACM Conference on Computer and Communication Security
November 2 - 5, 1998
California, San Francisco, USA

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)65
  • Downloads (Last 6 weeks)7
Reflects downloads up to 04 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)BGKey: Group Key Generation for Backscatter Communications Among Multiple DevicesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334565019(2470-2486)Online publication date: 2024
  • (2024)Discreet: distributed delivery service with context-aware cooperationAnnals of Telecommunications10.1007/s12243-024-01053-1Online publication date: 11-Jul-2024
  • (2023)Design of an Efficient Distributed Delivery Service for Group Key Agreement ProtocolsFoundations and Practice of Security10.1007/978-3-031-57537-2_25(408-423)Online publication date: 11-Dec-2023
  • (2020)Wireless Group AuthenticationEncyclopedia of Wireless Networks10.1007/978-3-319-78262-1_316(1488-1490)Online publication date: 30-Aug-2020
  • (2019)Autonomous UAV CinematographyACM Computing Surveys10.1145/334771352:5(1-33)Online publication date: 13-Sep-2019
  • (2019)Extraction and Analysis of Fictional Character NetworksACM Computing Surveys10.1145/334454852:5(1-40)Online publication date: 13-Sep-2019
  • (2019)Big Data Analytics for Large-scale Wireless NetworksACM Computing Surveys10.1145/333706552:5(1-36)Online publication date: 13-Sep-2019
  • (2019)A Survey of Group Key Agreement Protocols with Constant RoundsACM Computing Surveys10.1145/331846052:3(1-32)Online publication date: 18-Jun-2019
  • (2019)Evaluation of Hardware Data Prefetchers on Server ProcessorsACM Computing Surveys10.1145/331274052:3(1-29)Online publication date: 18-Jun-2019
  • (2019)Text Analysis in Adversarial SettingsACM Computing Surveys10.1145/331033152:3(1-36)Online publication date: 18-Jun-2019
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media