Teng, Jikai; Wu, Chuankun; Tang, Chunming; Tian, Youliang A strongly secure identity-based authenticated group key exchange protocol. (English) Zbl 1497.94117 Sci. China, Inf. Sci. 58, No. 9, Article ID 092108, 12 p. (2015). Cited in 1 Document MSC: 94A60 Cryptography Software:HMQV; NAXOS × Cite Format Result Cite Review PDF Full Text: DOI References: [1] Ingemarsson I, Tang D T, Wong C K. A conference key distribution system. IEEE Trans Inf Theory, 1982, 28: 714-720 · Zbl 1274.62443 · doi:10.1109/TIT.1982.1056542 [2] Barua, R.; Dutta, R.; Sarker, P., Extending Joux’s protocol to multi party key agreement, 205-217 (2003) · Zbl 1123.94376 [3] Reddy, K. C.; Nalla, D., Identity-based authenticated group key agreement protocol, 215-233 (2002) · Zbl 1033.94563 [4] Bresson, E.; Chevassut, O.; Pointcheval, D.; etal., Provably authenticated group Diffie-Hellman key exchange, 255-264 (2001) [5] Bresson, E.; Chevassut, O.; Pointcheval, D., Dynamic group Diffie-Hellman key exchange under standard assumptions, 321-336 (2002) · Zbl 1055.94009 [6] Bresson, E.; Chevassut, O.; Pointcheval, D., Provably authenticated group Diffie-Hellman key exchange-the dynamic case, 290-309 (2001) · Zbl 1064.94555 [7] Katz, J.; Yung, M., Scalable protocols for authenticated group key exchange, 110-125 (2003) · Zbl 1122.94426 [8] Burmester, M.; Desmedt, Y., A secure and efficient conference key distribution system, 275-286 (1995) [9] Choi, K. Y.; Hwang, J. Y.; Lee, D. H., Effcient ID-based group key agreement with bilinear maps, 130-144 (2004) · Zbl 1177.94140 [10] Kim, H. J.; Lee, S. M.; Lee, D. H., Constant-round authenticated group key exchange for dynamic groups, 245-259 (2004) · Zbl 1094.94528 [11] Dutta R, Barua R. Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans Inf Theory, 2007, 54: 2007-2025 · Zbl 1328.94066 · doi:10.1109/TIT.2008.920224 [12] Li H, Wu C K, Teng J K. Dynamic tree-based authenticated group key exchange protocol. Sci China Inf Sci, 2010, 53: 1591-1602 · Zbl 1497.94102 · doi:10.1007/s11432-010-4021-x [13] Teng J K, Wu C K, Tang C M. An ID-based authenticated dynamic group key agreement with optimal round. Sci China Inf Sci, 2012, 55: 2542-2554 · Zbl 1270.94065 · doi:10.1007/s11432-011-4381-x [14] Katz, J.; Shin, J. S., Modeling insider attacks on group key-exchange protocols, 180-189 (2005) · doi:10.1145/1102120.1102146 [15] Bresson, E.; Manulis, M., Malicious participants in group key exchange: key control and contributiveness in the shadow of trust, 395-409 (2007) · doi:10.1007/978-3-540-73547-2_41 [16] Bresson, E.; Manulis, M., Securing group key exchange against strong corruptions, 249-260 (2008) [17] Bohli J M, Gonzalez Vasco M I, Steinwandt R. Secure group key establishment revisited. Int J Inf Secur, 2007, 6: 243-254 · doi:10.1007/s10207-007-0018-x [18] Neupane, K.; Steinwandt, R., Communication-efficient 2-round group key establishment from pairings, 65-76 (2011) · Zbl 1284.94143 [19] Bresson E, Manulis M. Contributory group key exchange in the presence of malicious participants. IET Inf Secur, 2008, 2: 85-93 · doi:10.1049/iet-ifs:20070113 [20] Gorantla, M. C.; Boyd, C.; Nieto, J. M G., Modeling key compromise impersonation attacks on group key exchange protocols, 105-123 (2009) · Zbl 1227.94046 [21] Gorantla, M. C.; Boyd, C.; Nieto, J. M G.; etal., Generic one round group key exchange in the standard model, 1-15 (2009) [22] Zhao, J. J.; Gu, D. W.; Gorantla, M. C., Stronger security model of group key agreement, 435-440 (2011) [23] Krawczyk, H., HMQV: a high-performance secure Diffie-Hellman protocol, 546-566 (2005) [24] Ustaoglu B. Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. Des Codes Cryptogr, 2008, 46: 329-342 · Zbl 1178.94205 · doi:10.1007/s10623-007-9159-1 [25] Moriyama, D.; Okamoto, T., An eCK-secure authenticated key exchange protocol without random oracles, 154-167 (2009) · Zbl 1267.94126 · doi:10.1007/978-3-642-04642-1_14 [26] Ustaoglu, B., Comparing session state reveal and ephemeral key reveal for Diffie-Hellman protocol, 183-197 (2009) · Zbl 1267.94133 · doi:10.1007/978-3-642-04642-1_16 [27] Huang, H.; Cao, Z., An insider-resistant group key exchange protocol without signatures, 1-5 (2009) [28] Teng J K, Wu C K. A provable authenticated certificateless group key agreement with constant rounds. J Commun Netw, 2012, 14: 104-110 · doi:10.1109/JCN.2012.6184555 [29] Boneh, D.; Franklin, M., Identity-based encryption from the weil pairing, 213-229 (2001) · Zbl 1002.94023 [30] Barreto, P. S L. M.; Kim, H. Y.; Scott, M., Efficient algorithms for pairing based cryptosystems, 354-368 (2002) · Zbl 1026.94520 [31] Shamir, A., Identity-based cryptosystems and signature schemes, 47-53 (1984) · Zbl 1359.94626 [32] Ruxandra, F. O., Provable secure constant-round group key agreement protocol based on secret sharing, 489-498 (2013) [33] Florian, H., Efficient identity-based signature schemes based on pairings, 310-324 (2002) · Zbl 1066.94554 This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.