Block design-based key agreement for group data sharing in cloud computing
Data sharing in cloud computing enables multiple participants to freely share the group data,
which improves the efficiency of work in cooperative environments and has widespread …
which improves the efficiency of work in cooperative environments and has widespread …
A survey on cluster-based group key agreement protocols for WSNs
E Klaoudatou, E Konstantinou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The scope of this survey is to examine and thoroughly evaluate the cluster-based Group Key
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …
Pairing-based cryptographic protocols: A survey
The bilinear pairing such as Weil pairing or Tate pairing on elliptic and hyperelliptic curves
have recently been found applications in design of cryptographic protocols. In this survey …
have recently been found applications in design of cryptographic protocols. In this survey …
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing
Healthcare in fog computing is a novel topic in recent year. With the development of
technology, it is a pressing issue to accomplish the secure healthcare in fog computing …
technology, it is a pressing issue to accomplish the secure healthcare in fog computing …
Efficient ID-based group key agreement with bilinear maps
In modern collaborative and distributed applications, authenticated group key agreement
(GKA) is one of important issues. Recently identity (ID)-based authenticated GKA has been …
(GKA) is one of important issues. Recently identity (ID)-based authenticated GKA has been …
Provably secure constant round contributory group key agreement in dynamic setting
R Dutta, R Barua - IEEE Transactions on Information Theory, 2008 - ieeexplore.ieee.org
In this paper, we present and analyze a variant of Burmester-Desmedt group key agreement
protocol (BD) and enhance it to dynamic setting where a set of users can leave or join the …
protocol (BD) and enhance it to dynamic setting where a set of users can leave or join the …
Automated verification of group key agreement protocols
We advance the state-of-the-art in automated symbolic cryptographic protocol analysis by
providing the first algorithm that can handle Diffie-Hellman exponentiation, bilinear pairing …
providing the first algorithm that can handle Diffie-Hellman exponentiation, bilinear pairing …
An ECC‐based authenticated group key exchange protocol in IBE framework
With the rapid demand for various increasing applications, the internet users require a
common secret key to communicate among a group. The traditional key exchange protocols …
common secret key to communicate among a group. The traditional key exchange protocols …
Securing cluster-based ad hoc networks with distributed authorities
LC Li, RS Liu - IEEE transactions on wireless communications, 2010 - ieeexplore.ieee.org
In this paper, we address key management in cluster-based mobile ad hoc networks
(MANETs). Ensuring secure communication in an ad hoc network is extremely challenging …
(MANETs). Ensuring secure communication in an ad hoc network is extremely challenging …
Constant round dynamic group key agreement
R Dutta, R Barua - Information Security: 8th International Conference, ISC …, 2005 - Springer
We present a fully symmetric constant round authenticated group key agreement protocol in
dynamic scenario. Our proposed scheme achieves forward secrecy and is provably secure …
dynamic scenario. Our proposed scheme achieves forward secrecy and is provably secure …