[書籍][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Strongly secure authenticated key exchange from factoring, codes, and lattices

A Fujioka, K Suzuki, K Xagawa… - Designs, Codes and …, 2015 - Springer
An unresolved problem in research on authenticated key exchange (AKE) in the public-key
setting is to construct a secure protocol against advanced attacks such as key compromise …

Modeling key compromise impersonation attacks on group key exchange protocols

MC Gorantla, C Boyd, JMG Nieto… - ACM Transactions on …, 2008 - dl.acm.org
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various
models considering different adversarial actions. However, the analysis of group key …

Attribute-based authenticated key exchange

MC Gorantla, C Boyd, JM González Nieto - Australasian Conference on …, 2010 - Springer
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within
the framework of ciphertext-policy attribute-based systems. A notion of AKE-security for AB …

Bridging broadcast encryption and group key agreement

Q Wu, B Qin, L Zhang, J Domingo-Ferrer… - Advances in Cryptology …, 2011 - Springer
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of
members but requires a trusted party to distribute decryption keys. Group key agreement …

Authenticated asymmetric group key agreement based on certificateless cryptosystem

X Lv, H Li, B Wang - International Journal of Computer Mathematics, 2014 - Taylor & Francis
A recent primitive known as asymmetric group key agreement (AGKA) allows a group of
users to negotiate a common encryption key which is accessible to any entities and …

One-round authenticated group key exchange from isogenies

A Fujioka, K Takashima, K Yoneyama - … QLD, Australia, October 1–4, 2019 …, 2019 - Springer
This paper proposes two one-round authenticated group key exchange protocols from newly
employed cryptographic invariant maps (CIMs): one is secure in the quantum random oracle …

Dynamic asymmetric group key agreement protocol with traitor traceability

J Teng, H Ma - IET Information Security, 2019 - Wiley Online Library
In asymmetric group key agreement (ASGKA) protocols, a group of users establish a
common encryption key which is publicly accessible and compute pairwise different …

Constant round group key agreement protocols: A comparative study

E Makri, E Konstantinou - computers & security, 2011 - Elsevier
The scope of this paper is to review and evaluate all constant round Group Key Agreement
(GKA) protocols proposed so far in the literature. We have gathered all GKA protocols that …

Exposure-resilient one-round tripartite key exchange without random oracles

K Suzuki, K Yoneyama - IEICE Transactions on Fundamentals of …, 2014 - search.ieice.org
This paper studies Tripartite Key Exchange (3KE) which is a special case of Group Key
Exchange. Though general one-round GKE satisfying advanced security properties such as …