2000
DOI: 10.1109/71.877936
|View full text |Cite
|
Sign up to set email alerts
|

Key agreement in dynamic peer groups

Abstract: ÐAs a result of the increased popularity of group-oriented applications and protocols, group communication occurs in many different settings: from network multicasting to application layer tele-and videoconferencing. Regardless of the application environment, security services are necessary to provide communication privacy and integrity. This paper considers the problem of key agreement in dynamic peer groups. (Key agreement, especially in a group setting, is the stepping stone for all other security services.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
297
0
2

Year Published

2001
2001
2018
2018

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 499 publications
(300 citation statements)
references
References 29 publications
1
297
0
2
Order By: Relevance
“…In this class a number of variants exists. The most prominent ones besides Discrete Logarithm (DL) itself are the computational and decisional Diffie-Hellman (DH) assumptions [2,3,4] and their generalization [5,6]. Less known assumptions are Matching Diffie-Hellman [7,8], Square Exponent 1 (SE) [10,11], and the Inverse Exponent (IE) [12], an assumption also implicitly required for the security of [13,14].…”
Section: Introductionmentioning
confidence: 99%
“…In this class a number of variants exists. The most prominent ones besides Discrete Logarithm (DL) itself are the computational and decisional Diffie-Hellman (DH) assumptions [2,3,4] and their generalization [5,6]. Less known assumptions are Matching Diffie-Hellman [7,8], Square Exponent 1 (SE) [10,11], and the Inverse Exponent (IE) [12], an assumption also implicitly required for the security of [13,14].…”
Section: Introductionmentioning
confidence: 99%
“…The group KE protocols proposed by Ingemarsson et al [43], Burmester and Desmedt [29], and Steiner et al [58] may be the most well-known. Among them, Burmester-Desmedt protocol has been shown to be secure against passive eavesdropping in the standard model by Katz and Yung [48].…”
Section: Group Key Exchangementioning
confidence: 99%
“…A number of works have considered extending the 2-party Diffie-Hellman protocol [36] to the multi-party setting [43,57,29,58,10,50,51]. Among them, the works of Ingemarsson et al [43], Burmester and Desmedt [29], and Steiner et al [58] may be the most well-known. They are merely key exchange (KE) protocols, intended to be secure against a passive adversary only.…”
Section: Introductionmentioning
confidence: 99%
“…Following their work, many GKA protocols such as [15,2,10,4,12] were proposed. One of these protocols, BurmesterDesmedt (BD) [2] protocol, is an efficient and secure GKA protocol, which Katz and Yung [9] recently provided a rigorous security proof in the standard model.…”
Section: Related Workmentioning
confidence: 99%