References
- Amir, Y., Kim, Y., Nita-Rotaru, C., and Tsudik, G. "On the Performance of Group Key Agreement Protocols", ACM trans. on information and system security, vol. 7, no. 3, pp. 457- 488, 2004. https://doi.org/10.1145/1015040.1015045
- Bresson, E., Chevassut, O. "Provably authenticated group Diffie-Hellman key exchange", In Proc. of the 8th ACM CCS'01, 2001.
- Tripathi, S.; Biswas, G.P.; , "Design of efficient ternary-tree based group key agreement protocol for dynamic groups," Communication Systems and Networks and Workshops, 2009. COMSNETS 2009. First International , vol., no., pp.1-6, 5-10 Jan. 2009.
- Choie, Y., Jeong, E., and Lee, E. "Efficient identity-based authenticated key agreement protocol from pairings," Applied Mathematics and Computation, vol. 162, no. 1, pp. 179-188, 2005. . https://doi.org/10.1016/j.amc.2003.12.092
- Kaufman, C., Perlman, R, Speciner, M., "Network security: private communication in a public world, second edition," Prentice Hall Press Upper Saddle River, 2002.
- Diffie W. and Hellman, M. E. "New directions in cryptography," IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976. . https://doi.org/10.1109/TIT.1976.1055638
- Fekete, A., Lynch, N., and Shvartsman, A. "Specifying and using a partitionable group communication service," In ACM PODC '97, 1997.
- Hong, S. and Lopez-Benitez, N. "Enhanced Group Key Generation Algorithm," 10th IEEE/IFIP Network Operations and Management Symposium, 1-4, 2006. .
- Katz, J. and Yung, M. "Scalable Protocols for Authenticated Group Key Exchange," Journal of Cryptology, vol. 20, no. 1, pp. 85-113, 2006.
- Kim, Y. Group key agreement: theory and practice, Ph.D. dissertation, 2002.
- Kim, Y.; Perrig, A.; Tsudik, G.; , "Group key agreement efficient in communication," Computers, IEEE Transactions on , vol.53, no.7, pp. 905- 921, July 2004. https://doi.org/10.1109/TC.2004.31
- Kim, Y., Perrig, A., and Tsudik, G. "Tree-based group key agreement," ACM Transaction on Information and System Security, 2004.
- Lenstra, A. K. and Verheul, E. R. "Selecting cryptographic key sizes," Journal of Cryptology, vol. 14, no. 4, pp. 255-293, 2001. https://doi.org/10.1007/s00145-001-0009-4
- Steiner, M., Tsudik, G., and Waidner, M. "Key agreement in dynamic peer groups," IEEE Transactions on Parallel and Distributed Systems, vol. 11, no. 8, pp. 769-780, 2000. https://doi.org/10.1109/71.877936
- Wong, C., Gouda, M., and Lam S. Secure group communications using key graphs, IEEE / ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, 2000. https://doi.org/10.1109/90.836475
- Mike Burmester and Yvo Desmedt, "A secure and efficient conference key distribution system", Advances in Cryptology - EUROCRYPT '94, number 950 in Lecture Notes in Computer Science. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1995.