1996
DOI: 10.1007/978-1-5041-2919-0_46
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic key distribution and authentication protocols for secure group communication

Abstract: Authentication protocols have until now focussed on two or three party interaction and neglected n party interactions as in the case of more general group communication. In this discourse, the semantics of group authentication are addressed and a separation into complete and selective group authentication techniques is proposed.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

1997
1997
1997
1997

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…An overview of such protocols is given in (Hutchison and Bauknecht, 1996). In particular, these protocols for secure group authentication and key distribution can be distinguished by complete or selective interaction amongst group members and can also be implemented using either public/private key pairs, if these are available, or a trusted third party~ in the form of an authentication server.…”
Section: Group Cryptographic Keys and Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…An overview of such protocols is given in (Hutchison and Bauknecht, 1996). In particular, these protocols for secure group authentication and key distribution can be distinguished by complete or selective interaction amongst group members and can also be implemented using either public/private key pairs, if these are available, or a trusted third party~ in the form of an authentication server.…”
Section: Group Cryptographic Keys and Authenticationmentioning
confidence: 99%
“…While mechanism independence is achieved, specific mechanisms (Hutchison and Bauknecht, 1996) can be used to achieve secure group contexts in the case where a shared group cryptographic key is established.…”
Section: Introductionmentioning
confidence: 99%