References
- J. Nam, S. Kim, and D. Won, 'Secure group communications over combined wired and wireless networks,' in Proc. 2nd Int. Conf. on Trust, Privacy, and Security in Digital Business, 2005, vol. 3592, LNCS, pp. 90-99
- W. Diffie and M. E. Hellman, 'New directions in cryptography,' IEEE Trans. Inform. Theory, vol. 22, no. 6, pp. 644-654, 1976 https://doi.org/10.1109/TIT.1976.1055638
- I. Ingemarsson, D. Tang, and C. Wong, 'A conference key distribution system,' IEEE Trans. Inform. Theory, vol. 28, no. 5, pp. 714-720, 1982 https://doi.org/10.1109/TIT.1982.1056542
- E. Okamoto and K. Tanaka, 'Key distribution system based on identification information,' IEEE J. Select. Areas Commun., vol. 7, no. 4, pp. 481-485, 1989 https://doi.org/10.1109/49.17711
- S. M. Bellovin and M. Merritt, 'Encrypted key exchange: Password-based protocols secure against dictionary attacks,' in Proc. IEEE Symp. Security and Privacy, 1992, pp. 72-84
- A. Joux, 'A one round protocol for tripartite Diffie-Hellman,' J. Crypto., vol. 17, no.4, pp.263-276, 2003
- K.-K. R. Choo, 'Provably-secure mutual authentication and key establishment protocols lounge,' 2006, available at http://sky.fit.qut.edu.au/-choo/lounge.html
- M. Bellare and P. Rogaway, 'Entity authentication and key distribution,' in Proc. Crypto'93, 1993, LNCS, vol. 773, pp. 232-249
- M. Bellare and P. Rogaway, 'Provably secure session key distribution-the three party case,' in Proc. 27th ACM Symp. Theory of Computing, 1995, pp.57-66
- V. Shoup, 'On formal models for secure key exchange,' Cryptology ePrint Archive, Report 1999/012, 1999, available at http://eprint.iacr.org/1999/012
- M. Bellare, D. Pointcheval, and P. Rogaway, 'Authenticated key exchange secure against dictionary attacks,' in Proc. Eurocrypt 2000, LNCS, vol. 1807, 2000, pp. 139-155
- E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater, 'Provably authenticated group Diffie-Hellman key exchange,' in Proc. 8th ACM Conf. Computer and Commun. Security, 2001, pp. 255-264
- R. Canetti and H. Krawczyk, 'Universally composable notions of key exchange and secure channels,' in Proc. Eurocrypt 2002, LNCS, vol. 2332, 2002, pp. 337-351
- M. Abdalla, P.-A. Fouque, and D. Pointcheval, 'Password-based authenticated key exchange in the three-party setting,' in Proc. 8th Int. Workshop Practice and Theory in Public Key Crypto., LNCS, vol. 3386, 2005, pp.65-84
- J. Katz and J. S. Shin, 'Modeling insider attacks on group key-exchange protocols,' in Proc. 12th ACM Conf. Computer and Commun. Security, 2005, pp. 180-189
- B. Blanchet, 'A computationally sound mechanized prover for security protocols,' in Proc. IEEE Symp. Security and Privacy, 2006, pp. 140-154
- K.-K. R. Choo, 'Refuting security proofs for tripartite key exchange with model checker in planning problem setting,' in Proc. 19th IEEE Computer Security Foundations Workshop, 2006, pp. 297-308
- J. Katz, R. Ostrovsky, and M. Yung, 'Efficient password-authenticated key exchange using human-memorable passwords,' in Proc. Eurocrypt 2001, LNCS, vol. 2045, 2001, pp.475-494
- E. Bresson, O. Chevassut, and D. Pointcheval, 'Dynamic group Diffie-Hellman key exchange under standard assumptions,' in Proc. Eurocrypt 2002, LNCS, vol. 2332, 2002, pp. 321-336
- J. Katz and M. Yung, 'Scalable protocols for authenticated group key exchange,' in Proc. Crypto 2003, LNCS, vol. 2729, 2003, pp. 110-125
- H. Krawczyk, 'HMQV: A high-performance secure Diffie-Hellman protocol,' in Proc. Crypto 2005, LNCS, vol. 3621, 2005, pp. 546-566
- K.-K. R. Choo, C. Boyd, and Y. Hitchcock, 'Errors in computational complexity proofs for protocols,' in Proc. Asiacrypt 2005, LNCS, vol. 3788, 2005, pp. 624-643
- N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, 'Analyzing the energy consumption of security protocols,' in Proc. ACM Int. Symp. Low Power Electron. and Des., 2003, pp. 30-35
- N. Borisov, I. Goldberg, and D. Wagner, 'Intercepting mobile communications: the insecurity of 802.11,' in Proc. 7th ACM Conf. Mobile Computing and Networking, 2001, pp. 180-189
- D. Johnston and J. Walker, 'Overview of IEEE 802.16 security,' IEEE Security Privacy, vol. 2, no. 3, pp. 40-48, 2004
- S.-L. Ng and C. Mitchell, 'Comments on mutual authentication and key exchange protocols for low power wireless communications,' IEEE Commun. Lett., vol. 8, no. 4, pp. 262-263, 2004 https://doi.org/10.1109/LCOMM.2004.825724
- J. Nam, S. Kim, and D. Won, 'A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices,' IEEE Commun. Lett., vol. 9, no. 5, pp. 429-431, 2005 https://doi.org/10.1109/LCOMM.2005.1431161
- G. Ateniese, M. Steiner, and G. Tsudik, 'New multiparty authentication services and key agreement protocols,' IEEE J. Select. Areas Commun., vol. 18, no.4, pp.628-639, 2000 https://doi.org/10.1109/49.839937
- M. Steiner, G. Tsudik, and M. Waidner, 'Key agreement in dynamic peer groups,' IEEE Trans. Parallel Distrib. Syst., vol. 11, no. 8, pp. 769-780, 2000 https://doi.org/10.1109/71.877936
- W.-G. Tzeng and Z.-J. Tzeng, 'Round-efficient conference key agreement protocols with provable security,' in Proc. Asiacrypt 2000, LNCS, vol. 1976, 2000, pp. 614-627
- O. Pereira and J.-J. Quisquater, 'A security analysis of the Cliques protocols suites,' in Proc. 14th IEEE Computer Security Foundations Workshop, 2001, pp.73-81
- E. Bresson, O. Chevassut, and D. Pointcheval, 'Provably authenticated group Diffie-Hellman key exchange-the dynamic case,' in Proc. Asiacrypt 2001, LNCS, vol. 2248, 2001, pp. 290-309
- E. Bresson, O. Chevassut, and D. Pointcheval, 'Group Diffie-Hellman key exchange secure against dictionary attacks,' in Proc. Asiacrypt 2002, LNCS, vol. 2501, 2002, pp. 497-514
- C. Boyd and J.M.G. Nieto, 'Round-optimal contributory conference key agreement,' in Proc. 6th Int. Workshop Practice and Theory in Public Key Crypto., LNCS, vol. 2567, 2003, pp. 161-174
- Y. Kim, A. Perrig, and G. Tsudik, 'Tree-based group key agreement,' ACM Trans. Inform. Syst. Security, vol. 7, no. 1, pp. 60-96, 2004 https://doi.org/10.1145/984334.984337
- E. Bresson and D. Catalano, 'Constant round authenticated group key agreement via distributed computation,' in Proc. 7th Int. Workshop on Practice and Theory in Public Key Crypto., LNCS, vol. 2947, 2004, pp. 115-129
- Y. Amir, Y. Kim, C. Nita-Rotaru, and G. Tsudik, 'On the performance of group key agreement protocols,' ACM Trans. Inform. Syst. Security, vol. 7, no.3, pp.457-488, 2004 https://doi.org/10.1145/1015040.1015045
- Y. Kim, A. Perrig, and G. Tsudik, 'Group key agreement efficient in communication,' IEEE Trans. Comput., vol. 53, no. 7, pp. 905-921, 2004 https://doi.org/10.1109/TC.2004.31
- E. Bresson, O. Chevassut, A. Essiari, and D. Pointcheval, 'Mutual authentication and group key agreement for low-power mobile devices,' Comput. Commun., vol. 27, no. 17, pp. 1730-1737, 2004 https://doi.org/10.1016/j.comcom.2004.05.023
- H.-J. Kim, S.-M. Lee, and D. H. Lee, 'Constant-round authenticated group key exchange for dynamic groups,' in Proc. Asiacrypt 2004, LNCS, vol. 3329, 2004, pp.245-259
- R. Dutta and R. Barna, 'Constant round dynamic group key agreement,' in Proc. 8th Inform. Security Conf., LNCS, vol. 3650, 2005, pp. 74-88
- J. Nam, J. Lee, S. Kim, and D. Won, 'DDH-based group key agreement in a mobile environment,' J. Syst. Softw., vol. 78, no. 1, pp. 73-83, 2005 https://doi.org/10.1016/j.jss.2004.10.024
- M. Abdalla, E. Bresson, O. Chevassut, and D. Pointcheval, 'Password-based group key exchange in a constant number of rounds,' in Proc. 9th Int. Workshop Practice and Theory in Public Key Crypto., LNCS, vol. 3958, 2006, pp. 427-442
- Q. Tang and K.-K. R. Choo, 'Secure password-based authenticated group key agreement for data-sharing peer-to-peer networks,' in Proc. 4th Int. Conf. Applied Crypto. and Network Security, LNCS, vol. 3989, 2006, pp.162-177
- K. Becker and U. Wille, 'Communication complexity of group key distribution,' in Proc. 5th ACM Conf. Computer and Commun. Security, 1998, pp.1-6
- M. Burmester and Y. Desmedt, 'A secure and efficient conference key distribution system,' in Proc. Eurocrypt 1994, LNCS, vol. 950, 1994, pp. 275-286
- J. Herranz and J. L. Villar, 'An unbalanced protocol for group key exchange,' in Proc. 1st Int. Conf. Trust, Privacy, and Security in Digital Business, LNCS, vol. 3184, 2004, pp. 172-180
- G. Horn, K. M. Martin, and C. J. Mitchell, 'Authentication protocols for mobile network environment value-added services,' IEEE Trans. Veh. Technol., vol. 51, no. 2, pp. 383-392, 2002 https://doi.org/10.1109/25.994813
- C. Wong, M. Gouda, and S. Lam, 'Secure group communications using key graphs,' in Proc. ACM SIGCOMM'98, 1998, pp. 68-79
- D. Wallner, E. Harder, and R. Agee, 'Key management for multicast: issues and architectures,' RFC 2627, IETF, 1999
- A. Perrig, D. Song, and J.D. Tygar, 'ELK, a new protocol for efficient large-group key distribution,' in Proc. IEEE Symp. Security and Privacy, 2001, pp. 247-262
- W. Diffie, P. Oorschot, and M. Wiener, 'Authentication and authenticated key exchanges,' Des., Codes, Crypto., vol. 2, no. 2, pp. 107-125, 1992 https://doi.org/10.1007/BF00124891
- D. Denning and G. Sacco, 'Timestamps in key distribution protocols,' Commun. ACM, vol. 24, no. 8, pp. 533-536, 1981 https://doi.org/10.1145/358722.358740
- M. Bellare and P. Rogaway, 'Random oracles are practical: A paradigm for designing efficient protocols,' in Proc. 1st ACM Conf. Computer and Commun. Security, 1993, pp. 62-73
- R. Canetti and H. Krawczyk, 'Analysis of key-exchange protocols and their use for building secure channels,' in Proc. Eurocrypt 2001, 2001, LNCS, vol. 2045, pp. 453-474
- A. O. Freier, P. Karlton, and P. C. Kocher, 'The SSL protocol version 3.0,' Internet draft, Netscape Communications, 1996
- S. Kent and R. Atkinson, 'Security architecture for the Internet protocol,' RFC 2401, 1998
- S. Goldwasser and S. Micali, 'Probabilistic encryption,' J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, 1984 https://doi.org/10.1016/0022-0000(84)90070-9