2002
DOI: 10.1007/3-540-36231-2_18
|View full text |Cite
|
Sign up to set email alerts
|

Identity Based Authenticated Group Key Agreement Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2003
2003
2015
2015

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(21 citation statements)
references
References 8 publications
0
21
0
Order By: Relevance
“…Our protocol is verified to be more efficient than the previous group key agreement protocols [4], [6], [7], [8].…”
Section: B Complexity Analysismentioning
confidence: 89%
See 1 more Smart Citation
“…Our protocol is verified to be more efficient than the previous group key agreement protocols [4], [6], [7], [8].…”
Section: B Complexity Analysismentioning
confidence: 89%
“…The modified protocol is more efficient than the earlier protocol. We demonstrate that our group key agreement protocol, which is based on the modified protocol, is more efficient than the previous schemes [4], [6], [7], [8].…”
Section: Introductionmentioning
confidence: 95%
“…The first ID-based authenticated group key agreement protocol was proposed by Reddy et al [9]. It utilized a binary tree structure and achieves authentication with ID-based cryptosystem, hence avoids management of certificates.…”
Section: Related Workmentioning
confidence: 99%
“…The first ID-based authenticated group key agreement(ID-AGKA) protocol was proposed by Reddy et al [14], but it still requires O(log 2 n ) rounds for n number of participants. Some constant round protocols based on the ID-based cryptosystem has been proposed like [15]- [17], but these are not exactly suitable for Pay-Tv system and requires bilinear paring computations.…”
Section: Related Workmentioning
confidence: 99%