참고문헌
- H.-J. Seo and H.-W. Kim, "User authentication method on VANET environment, " J. KICS, vol. 37C, no. 7, pp. 576-583, Jul. 2012. https://doi.org/10.7840/KICS.2012.37.7C.576
- Y.-S. Kim, "An efficient multi-signature scheme for shared data in a cloud storage, " J. KICS, vol. 38A, no. 11, pp. 967-969, Nov. 2013. https://doi.org/10.7840/kics.2013.38A.11.967
- S.-G. Min, Y.-H. Park, Y.-H. Park, and S.-J. Moon, "Secure routing protocol in cluster-based ad hoc networks, " J. KICS, vol. 37C, no. 12, pp. 1256-1262, Dec. 2012. https://doi.org/10.7840/kics.2012.37C.12.1256
- E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater, "Provably authenticated group diffie-hellman key exchange, " in Proc. ACM Conf. Comput. Commun. Security (CCS '01), pp. 255-264, 2001.
- E. Bresson, O. Chevassut, and D. Pointcheval, "Provably-secure authenticated group diffiehellman key exchange, " ACM Trans. Inf. Syst. Security(TISSEC), vol. 10, no. 3, pp. 255-264, Jul. 2007.
- J. M. Bohli, "A framework for robust group key agreement, " in Proc. Int. Conf. Comput. Sci. Appl. (ICCSA '06), pp. 355-364, 2006.
- M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system, " in Proc. Eurocrypt, vol. 950, pp. 275-286, Italy, May 1994.
- B. Gopalakrishnan and A. Shanmugam, "An authenticated transitive-closure scheme for secure group communication in MANETS, " in Proc. Mining Intell. Knowledge Exploration, vol. 8284 of LNCS, pp 362-369, Tamil Nadu, India, Dec. 2013.
- J. C. Cheng and C. S. Laih, "Conference key agreement protocol with non interactive faulttolerance over broadcast network, " Int. J. Inf. Security, vol. 8, no. 1, pp. 37-48, 2009. https://doi.org/10.1007/s10207-008-0062-1
- J. Wu, Q. Liu, and X. Liao, "A secure and efficient outsourceable group key transfer protocol in cloud computing, " in Proc. SCC'14, pp. 43-50, Kyoto, Japan, Jun. 2014.
- L. Harn and C. Lin, "Authenticated group key transfer protocol based on secret sharing, " IEEE. Trans. Computers, vol. 59, no. 6, pp. 842-846, Jun. 2010. https://doi.org/10.1109/TC.2010.40
- Y. Liu, C. Cheng, J. Cao, and T. Jiang, "An improved authenticated group key transfer protocol based on secret sharing, " IEEE Trans. Computers, vol. 62, no. 11, pp. 2335-2336, Nov. 2013. https://doi.org/10.1109/TC.2012.216
- A. Shamir, "How to share a secret, " Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979. https://doi.org/10.1145/359168.359176