참고문헌
- M. Burmester and Y. Desmedt, 'A secure and efficient conference key distribution system,' Eurocrypt'94, LNCS 950, pp. 275-286, 1994.
- M. Steiner, G. Tsudik, and M. Waidner, 'Diffie-Hellman key distribution extended to group communication,' Proceedings of ACM CCS'96, pp. 31-37, 1996
- K. Becker and U. Wille, 'Communication complexity of group key distribution,' Proceedings of ACM CCS'98, pp. 1-6, 1998
- J. Katz and M. Yung, 'Scalable protocols for authenticated group key exchange,' Crypto'03, LNCS 2729, pp. 110-125, August 2003
- C. Boyd and J.M.G. Nieto, 'Round-optimal contributory conference key agreement,' PKC' 03, LNCS 2567, pp. 161-174, 2003
- E. Bresson and D. Catalano, 'Constant round authenticated group key agreement via distributed computation,' PKC'04, LNCS 2947, pp. 115-129, 2004
- N. Borisov, I. Goldberg, and D. Wagner, 'Intercepting mobile communications: The insecurity of 802.11,' Proceedings of ACM MobiCom'01, pp. 180-189, 2001
- E. Bresson, O. Chevassut, A. Essiari, and D. Pointcheval, 'Mutual authentication and group key agreement for low-power mobile devices,' Computer Communications, vol. 27, no. 17, pp. 1730-1737, 2004 https://doi.org/10.1016/j.comcom.2004.05.023
- W. Diffie, P. Oorschot, and M. Wiener, 'Authentication and authenticated key exchanges,' Designs, Codes, and Cryptography, vol. 2, no. 2, pp. 107-125, 1992 https://doi.org/10.1007/BF00124891
- G. Ateniese, M. Steiner, and G. Tsudik, 'New multiparty authentication services and key agreement protocols,' IEEE Journal on Selected Areas in Communications, vol. 18, no. 4, pp. 628-639, April 2000 https://doi.org/10.1109/49.839937
- C. Wong, M. Gouda, and S. Lam, 'Secure group communications using key graphs,' Proceedings of ACM SIGCOMM'98, pp. 68-79, 1998
- A. Perrig, D. Song, and J.D. Tygar, 'ELK, a new protocol for efficient large-group key distribution,' Proceedings of the IEEE Symposium on Security and Privacy, pp. 247-262, 2001
- W. Diffie and M.E. Hellman, 'New Directions in cryptography,' IEEE Trans. on Information Theory, vol. 22, no. 6, pp. 644-654, 1976 https://doi.org/10.1109/TIT.1976.1055638
- I. Ingemarsson, D. Tang, and C. Wong, 'A conference key distribution system,' IEEE Trans. on Information Theory, vol. 28, no. 5, pp. 714-720, September 1982 https://doi.org/10.1109/TIT.1982.1056542
- J.Y. Hwang, K.Y. Choi, D.H. Lee, and J.M. Baik, 'Efficient Password-based Grpup Key Exchange Protocol,' Journal of Korean Institute of Information Security and Cryptology, vol. 14, no. 1, pp. 59-69, 2004
- E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater, 'Provably authenticated group Diffie-Hellman key exchange,' Proceedings of ACM CCS'01, pp. 255-264, 2001
- M. Bellare and P. Rogaway, 'Random oracles are practical: A paradigm for designing efficient protocols,' Proceedings of ACM CCS'93, pp. 62-73, 1993