참고문헌
- K. Becker. and U. Wille. 'Communication complexity of group key distribution,' ACM CCCS'98. pp. 1-6. 1998
- E. Bresson. O. Chevassut. D. Pointcheval. and J.-J. Quisquater. 'Provably authenticated group Diffie-Hellman key exchange.' ACM CCCS'Ol. pp. 255-264. 2001
- J. Katz and M. Yung. 'Scalable protocols for authenticated group key exchange.' Crypto'03. LNCS 2729. pp. 110-125. August 2003
- C. Boyd and J.M.G. Nieto. 'Roundoptimalcontributory conference key agreement.'PKC'03. LNCS 2567. pp. 161-174. 2003
- E. Bresson and D. Catalano. 'Constant round authenticated group key agreement via distributed computation.' PKC'04. LNCS 2947. pp. 115-129. 2004
- M. Steiner. G. Tsudik. and M. Waidner. 'Key agreement in dynamic peer groups.' IEEE Trans. on Parallel and Distrib. Syst.. vol. 11. no. 8. pp. 769-780. August 2000 https://doi.org/10.1109/71.877936
- Y. Kim. A. Perrigo and G. Tsudik. 'Simple and fault-tolerant key agreement for dynamic collaborative groups.' ACM CCCS'00. pp. 235-244. 2000
- D.A. Agarwal. O. Chevassut. M.R. Thompson. and G. Tsudik. 'An integrated solution for secure group communication in wide-area networks.' In Proc. of 6th IEEE Symposium on Computers and Communications. pp. 22-28. 2001
- Y. Kim. A. Perrigo and G. Tsudik. 'Communication-efficient group key agreement.' IFIP SEC'01. pp. 229-244. June 2001
- E. Bresson. O. Chevassut. and D. Pointcheval. 'Provably authenticated group Diffie-Hellman key exchange the dynamic case.' Asiacrypt'01. LNCS 2248. pp. 290-309. 2001
- E. Bresson. O. Chevassut. and D. Pointcheval. 'Dynamic group Diffie Hellman key exchange under standard assumptions.' Eurocrypt'02. LNCS 2332. pp. 321-336. 2002
- S. Lee. J. Cheon. and Y. Kim. 'Treebased group key agreement protocol using pairing,' Journal of the Korea Institute of Information Security and Cryptology. vol.l3. no.3. pp. 101-110. 2003
- Y. Park. B. Chung. Y. Lee. H. Kim, J. Lee. and H. Yoon. "Scalable hierarchical group key establishment using Diffie-Hellman key exchange," Journal of the Korea Institute of Information Security and Cryptology. vol.13. no.5. pp. 3-15. 2003
- W. Diffie and M.E. Hellman. 'New Directions in cryptography,' IEEE Trans, on Information Theory. vol.22, pp. 644-654. 1976 https://doi.org/10.1109/TIT.1976.1055638
- I. Ingemarsson. D. Tang. and C. Wong. 'A conference key distribution system,' IEEE Trans. on Information Theory. vol.28. no.5. pp. 714-720. September 1982 https://doi.org/10.1109/TIT.1982.1056542
- D.G, Steer. L. Strawczynski, W, Diffie. and M. Wiener. 'A secure audio teleconference system.' Crypto '88. LNCS 403. pp. 520-528. 1988
- M. Burmester and Y. Desmedt, 'A secure and efficient conference key distribution system.' Eurocrypt'94, LNCS 950. pp. 275-286. 1994
- M. Just and S. Vaudenay. 'Authenticated multi-party key agreement,' Asiacrypt'96. LNCS 1163. pp. 36-9, 1996
- G. Ateniese. M. Steiner. and G.Tsudik. 'New multiparty authentication services and key agreementprotocols,' IEEE Journal on Selected Areas in Communications. vol.18. no.4. pp. 628-639. April 2000 https://doi.org/10.1109/49.839937
- W.-G. Tzeng and Z.-J. Tzeng. 'Round-efficient conference key agreement protocols with provable security,' Asiacrypt'00. LNCS 1976. pp. 614-627. 2000
- O. Pereira and J.-J. Quisquater. 'Asecurity analysis of the Cliques protocols suites,' In Proc. of 14th IEEE Computer Security Foundations Workshop. pp. 73-81. June 2001
- M. Bellare and P. Rogaway. 'Entity authentication and key distribution.' Crypto'93. LNCS 773. pp. 232-249, 1993
- M. Bellare and P. Rogaway. 'Provably secure session key distribution - the three party case,' ACM STOC'95, pp. 57-66. 1995
- M. Bellare. D. Pointcheval. and P. Rogaway. 'Authenticated key exchange secure against dictionary attacks.' Eurocrypt'00. LNCS 1807. pp. 139-155. 2000
- M. Bellare and P. Rogaway. 'Random oracles are practical: A paradigm for designing efficient protocols,' ACM CCCS'93. pp. 62-73. 1993
- T. EIGamal, 'A public key cryptosystem and a signature scheme based on discrete logarithms.' IEEE Trans. on Information Theory. vol.31. no.4. pp. 469-472, July 1985 https://doi.org/10.1109/TIT.1985.1057074
- A. Shamir. 'How to share a secret.' Communications of the ACM. vol.22. no.11, pp. 612-613. November 1979 https://doi.org/10.1145/359168.359176
- W. Diffie. P. van Oorschot, and M. Wiener, 'Authentication and authenticated key exchanges,' Designs, Codes. and Cryptography, vol.2. pp. 107-125. 1992 https://doi.org/10.1007/BF00124891
- M. Steiner. G. Tsudik. and M. Waidner. 'Diffie-Hellman key distribution extended to group communication,' ACM CCCS'96. pp. 31-37, 1996
- E. Biham, D. Boneh. and O. Reingold. 'Breaking generalized DiffieHellman modulo a composite is no easier than factoring,' Information Processing Letters (IPL). vol. 70. no.2. pp. 83-87. 1999 https://doi.org/10.1016/S0020-0190(99)00047-2
- E. Bresson. O. Chevassut. and D. Pointcheval. 'Group Diffie-Hellman key exchange secure against dictionary attacks.' Asiacrypt'02. LNCS 2501. pp, 497-514. 2002
- J. Hwang, K. Choi. D. Lee, and J. Baik, 'Efficient password-based group key exchange protocol.' Journal of the Korea Institute of Information Security and Cryptology, vol.l4, no.1. pp. 59-69, 2004
- S. Goldwasser, S. Micali, and R. Rivest, 'A digital signature scheme secure against adaptive chosenmessage attacks,' SIAM Journal of Computing, vol.l7, no,2, pp. 281-308. 1988 https://doi.org/10.1137/0217017