CoCoA: concurrent continuous group key agreement

J Alwen, B Auerbach, MC Noval, K Klein… - … Conference on the …, 2022 - Springer
Messaging platforms like Signal are widely deployed and provide strong security in an
asynchronous setting. It is a challenging problem to construct a protocol with similar security …

Provably secure constant round contributory group key agreement in dynamic setting

R Dutta, R Barua - IEEE Transactions on Information Theory, 2008 - ieeexplore.ieee.org
In this paper, we present and analyze a variant of Burmester-Desmedt group key agreement
protocol (BD) and enhance it to dynamic setting where a set of users can leave or join the …

Cerium doped heavy metal fluoride glasses, a possible alternative for electromagnetic calorimetry

E Auffray, D Bouttet, I Dafinei, J Fay, P Lecoq… - Nuclear Instruments and …, 1996 - Elsevier
The article is an overview of the research activity made in the framework of the Crystal Clear
Collaboration aimed at obtaining scintillating glasses able to fit the constraints imposed for …

Constant round dynamic group key agreement

R Dutta, R Barua - Information Security: 8th International Conference, ISC …, 2005 - Springer
We present a fully symmetric constant round authenticated group key agreement protocol in
dynamic scenario. Our proposed scheme achieves forward secrecy and is provably secure …

Dynamic asymmetric group key agreement for ad hoc networks

X Zhao, F Zhang, H Tian - Ad Hoc Networks, 2011 - Elsevier
A group key agreement protocol allows a set of users to establish a common symmetric key
via open networks. Dynamic asymmetric group key agreement means that a dynamic set of …

TJET: Ternary join-exit-tree based dynamic key management for vehicle platooning

C Xu, R Lu, H Wang, L Zhu, C Huang - IEEE Access, 2017 - ieeexplore.ieee.org
Vehicle platooning, which is formed by a group of vehicles traveling in close proximity to one
another, nose-to-tail, at highway speeds, has received considerable attention in recent …

A secure and efficient group key agreement approach for mobile ad hoc networks

O Ermiş, Ş Bahtiyar, E Anarım, MU Çağlayan - Ad Hoc Networks, 2017 - Elsevier
Mobile ad hoc networks have been used in many application areas such as sensors, file
sharing and vehicle-to-vehicle communications. Providing secure communications among …

A provable authenticated certificateless group key agreement with constant rounds

J Teng, C Wu - Journal of Communications and Networks, 2012 - ieeexplore.ieee.org
Group key agreement protocols allow a group of users, communicating over a public
network, to establish a shared secret key to achieve a cryptographic goal. Protocols based …

Overview of key agreement protocols

R Dutta, R Barua - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Overview of Key Agreement Protocols 1 Introduction Page 1 Overview of Key Agreement
Protocols Ratna Dutta and Rana Barua Stat-Math Unit Indian Statistical Institute 203, BT Road …

Formal analysis of fault-tolerant group key management using ZooKeeper

S Skeirik, RB Bobba, J Meseguer - 2013 13th IEEE/ACM …, 2013 - ieeexplore.ieee.org
Security-as-a-Service (SecaaS) is gaining popularity, with cloud-based anti-spam and anti-
virus leading the way. In this work we look at key management as a security service and …