2011
DOI: 10.1007/978-3-642-25385-0_8
|View full text |Cite
|
Sign up to set email alerts
|

Bridging Broadcast Encryption and Group Key Agreement

Abstract: Abstract. Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but requires a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common encryption key via open networks so that only the members can decrypt the ciphertexts encrypted under the shared encryption key, but a sender cannot exclude any particular member from decrypting the ciphertexts. In this paper, we bridge these two notions with a hyb… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
6
2
1

Relationship

3
6

Authors

Journals

citations
Cited by 36 publications
(16 citation statements)
references
References 34 publications
0
16
0
Order By: Relevance
“…The limitation of this scheme is the slow reaction to node's behavior. All those schemes are distributed patterns except RIW [9]. RIW is a centralized pattern, it uses the idea of the three-window weighted average to get a reputation estimation and control process, the limitation of that scheme is that the value of the weight parameter is critical and the literature doesn't propose any parameter extraction method.…”
Section: Related Workmentioning
confidence: 99%
“…The limitation of this scheme is the slow reaction to node's behavior. All those schemes are distributed patterns except RIW [9]. RIW is a centralized pattern, it uses the idea of the three-window weighted average to get a reputation estimation and control process, the limitation of that scheme is that the value of the weight parameter is critical and the literature doesn't propose any parameter extraction method.…”
Section: Related Workmentioning
confidence: 99%
“…Recent references paid more attentions to contributory and collaborative group key agreement [14,46,24,25,1,2], etc. Recently, the concepts of asymmetric group key agreement and contributory broadcast encryption were proposed [42,43]. An asymmetric group key agreement (ASGKA) protocol [42] lets the group members negotiate a shared encryption key instead of a common secret key.…”
Section: A Brief Survey Of Related Workmentioning
confidence: 99%
“…The encryption key is accessible to attackers and corresponds to different decryption keys, each of which is only computable by one group member. A contributory broadcast encryption (CBE) [43] enables a group of members negotiate a common public encryption key while each member holds a decryption key.…”
Section: A Brief Survey Of Related Workmentioning
confidence: 99%
“…The AGKA protocol in [23] and its plain extensions [24,25] does not consider the attacks from active adversaries. This is because the protocol participants are not authenticated during the execution of the protocol.…”
Section: Introductionmentioning
confidence: 99%