scientific article; zbMATH DE number 2081072
From MaRDI portal
Publication:4474181
zbMath1064.94555MaRDI QIDQ4474181
Olivier Chevassut, David Pointcheval, Emmanuel Bresson
Publication date: 4 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2248/22480290.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (34)
Security analysis of broadcaster group key exchange protocols ⋮ A strongly secure identity-based authenticated group key exchange protocol ⋮ UC-secure and Contributory Password-Authenticated Group Key Exchange ⋮ EC2C-PAKA: an efficient client-to-client password-authenticated key agreement ⋮ Multicast key agreement, revisited ⋮ ID-based authenticated group key agreement from bilinear maps ⋮ An ID-based authenticated dynamic group key agreement with optimal round ⋮ A secure and efficient on-line/off-line group key distribution protocol ⋮ Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction ⋮ Provably secure one-round identity-based authenticated asymmetric group key agreement protocol ⋮ One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model ⋮ A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort ⋮ An XTR-based constant round key agreement scheme ⋮ Authenticated Group Key Agreement Protocol Without Pairing ⋮ Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks ⋮ Polynomial interpolation of the generalized Diffie-Hellman and Naor-Reingold functions ⋮ Multi-party authenticated key agreement protocols from multi-linear forms ⋮ The TLS handshake protocol: A modular analysis ⋮ Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting ⋮ A Modular Security Analysis of the TLS Handshake Protocol ⋮ Revisiting Pairing Based Group Key Exchange ⋮ A general compiler for password-authenticated group key exchange protocol ⋮ Communication-Efficient 2-Round Group Key Establishment from Pairings ⋮ Asymmetric Group Key Agreement ⋮ On the Minimum Communication Effort for Secure Group Key Exchange ⋮ Group key exchange protocols from supersingular isogenies ⋮ Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness ⋮ Analysis of the SSH Key Exchange Protocol ⋮ A secure and scalable group key exchange system ⋮ Signed (group) Diffie-Hellman key exchange with tight security ⋮ Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks ⋮ An algebraic approach to the verification of a class of Diffie-Hellman protocols ⋮ A conference key distribution system ⋮ Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
This page was built for publication: