Citation: | LI Ming, WANG Yong, GU Da-wu, BAI Ying-cai. Authenticated Key Agreement in Group Settings[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2006, 15(2): 186-189. |
[1] |
Per rig A. Efficient collaborative key management proto cols for secure autonomous group communication[Z]. In ternational Wor kshop on Cryptog raphic Techniques andE Commerce, Ho ng Kong, 1999.
|
[2] |
Joux A. A one round protocol for tripart ite Diffie Hell man[Z]. 4th Algorithmic Number T heory Symposium,Leiden, the Netherlands, 2000.
|
[3] |
Kim Y, Tsudik G. Communicat ion efficient g roup keyagr eement[Z]. 16th I nternational Conference on Infor mation Security (IFIP/SEC 2001), Paris, 2001.
|
[4] |
Al Riyami S S, Paterson K G. Aut henticated three partykey agreement protocols from pair ings[EB/OL]. http: 0epr int. iacr. org / 2002/ 035/, 2002-03-20/ 2003-12-24.
|
[5] |
Bresson E, Chev assut O, Pointchev al D. Provably au thenticated group Diffie Hellman key ex change—the dy-namic case[Z]. 7th International Conference on t he The ory and Application of Cryptology and Informat ion Secu rity, Go ld Coast, Australia, 2001.
|
[6] |
Reddy K C, Nalla D. Identity based authenticated groupkey agreement protocol[Z]. Third Inter national Confer ence on Crypto logy in I ndia, Hyderabad, India, 2002.
|
[7] |
Smart N P. An identity based authent icated key agr ee ment protocol based on the Weil pairing[EB/OL]. http:0 ww w. ime. usp. br/ rt/ cranalysis/, 2004-02-20/2004-02-24.
|
[8] |
Joux A. The Weil and Tate pair ings as building blocks forpublic key cryptosystems [Z]. 5th Inter national Sympo sium on Algor ithmic Number Theory, Sydney, Australia,2002.
|