Block design-based key agreement for group data sharing in cloud computing

J Shen, T Zhou, D He, Y Zhang, X Sun… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
Data sharing in cloud computing enables multiple participants to freely share the group data,
which improves the efficiency of work in cooperative environments and has widespread …

A survey on cluster-based group key agreement protocols for WSNs

E Klaoudatou, E Konstantinou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The scope of this survey is to examine and thoroughly evaluate the cluster-based Group Key
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …

Pairing-based cryptographic protocols: A survey

R Dutta, R Barua, P Sarkar - Cryptology ePrint Archive, 2004 - eprint.iacr.org
The bilinear pairing such as Weil pairing or Tate pairing on elliptic and hyperelliptic curves
have recently been found applications in design of cryptographic protocols. In this survey …

Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing

J Shen, H Yang, A Wang, T Zhou, C Wang - Peer-to-Peer Networking and …, 2019 - Springer
Healthcare in fog computing is a novel topic in recent year. With the development of
technology, it is a pressing issue to accomplish the secure healthcare in fog computing …

Efficient ID-based group key agreement with bilinear maps

KY Choi, JY Hwang, DH Lee - International Workshop on Public Key …, 2004 - Springer
In modern collaborative and distributed applications, authenticated group key agreement
(GKA) is one of important issues. Recently identity (ID)-based authenticated GKA has been …

Provably secure constant round contributory group key agreement in dynamic setting

R Dutta, R Barua - IEEE Transactions on Information Theory, 2008 - ieeexplore.ieee.org
In this paper, we present and analyze a variant of Burmester-Desmedt group key agreement
protocol (BD) and enhance it to dynamic setting where a set of users can leave or join the …

Automated verification of group key agreement protocols

B Schmidt, R Sasse, C Cremers… - 2014 IEEE Symposium …, 2014 - ieeexplore.ieee.org
We advance the state-of-the-art in automated symbolic cryptographic protocol analysis by
providing the first algorithm that can handle Diffie-Hellman exponentiation, bilinear pairing …

An ECC‐based authenticated group key exchange protocol in IBE framework

DS Gupta, GP Biswas - International Journal of Communication …, 2017 - Wiley Online Library
With the rapid demand for various increasing applications, the internet users require a
common secret key to communicate among a group. The traditional key exchange protocols …

Securing cluster-based ad hoc networks with distributed authorities

LC Li, RS Liu - IEEE transactions on wireless communications, 2010 - ieeexplore.ieee.org
In this paper, we address key management in cluster-based mobile ad hoc networks
(MANETs). Ensuring secure communication in an ad hoc network is extremely challenging …

Constant round dynamic group key agreement

R Dutta, R Barua - Information Security: 8th International Conference, ISC …, 2005 - Springer
We present a fully symmetric constant round authenticated group key agreement protocol in
dynamic scenario. Our proposed scheme achieves forward secrecy and is provably secure …