[書籍][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
Strongly secure authenticated key exchange from factoring, codes, and lattices
An unresolved problem in research on authenticated key exchange (AKE) in the public-key
setting is to construct a secure protocol against advanced attacks such as key compromise …
setting is to construct a secure protocol against advanced attacks such as key compromise …
Modeling key compromise impersonation attacks on group key exchange protocols
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various
models considering different adversarial actions. However, the analysis of group key …
models considering different adversarial actions. However, the analysis of group key …
Attribute-based authenticated key exchange
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within
the framework of ciphertext-policy attribute-based systems. A notion of AKE-security for AB …
the framework of ciphertext-policy attribute-based systems. A notion of AKE-security for AB …
Bridging broadcast encryption and group key agreement
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of
members but requires a trusted party to distribute decryption keys. Group key agreement …
members but requires a trusted party to distribute decryption keys. Group key agreement …
Authenticated asymmetric group key agreement based on certificateless cryptosystem
X Lv, H Li, B Wang - International Journal of Computer Mathematics, 2014 - Taylor & Francis
A recent primitive known as asymmetric group key agreement (AGKA) allows a group of
users to negotiate a common encryption key which is accessible to any entities and …
users to negotiate a common encryption key which is accessible to any entities and …
One-round authenticated group key exchange from isogenies
A Fujioka, K Takashima, K Yoneyama - … QLD, Australia, October 1–4, 2019 …, 2019 - Springer
This paper proposes two one-round authenticated group key exchange protocols from newly
employed cryptographic invariant maps (CIMs): one is secure in the quantum random oracle …
employed cryptographic invariant maps (CIMs): one is secure in the quantum random oracle …
Dynamic asymmetric group key agreement protocol with traitor traceability
J Teng, H Ma - IET Information Security, 2019 - Wiley Online Library
In asymmetric group key agreement (ASGKA) protocols, a group of users establish a
common encryption key which is publicly accessible and compute pairwise different …
common encryption key which is publicly accessible and compute pairwise different …
Constant round group key agreement protocols: A comparative study
The scope of this paper is to review and evaluate all constant round Group Key Agreement
(GKA) protocols proposed so far in the literature. We have gathered all GKA protocols that …
(GKA) protocols proposed so far in the literature. We have gathered all GKA protocols that …
Exposure-resilient one-round tripartite key exchange without random oracles
This paper studies Tripartite Key Exchange (3KE) which is a special case of Group Key
Exchange. Though general one-round GKE satisfying advanced security properties such as …
Exchange. Though general one-round GKE satisfying advanced security properties such as …