최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기韓國컴퓨터情報學會論文誌 = Journal of the Korea Society of Computer and Information, v.17 no.4, 2012년, pp.91 - 98
이영숙 (호원대학교 사이버수사 경찰학부) , 김지연 (성균관대학교 정보통신공학부) , 원동호 (성균관대학교 정보통신공학부)
A group key exchange (GKE) protocol is designed to allow a group of parties communicating over a public network to establish a common secret key. As group-oriented applications gain popularity over the Internet, a number of GKE protocols have been suggested to provide those applications with a secur...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Twitter, http://twitter.com
Facebook, http://www.facebook.com
X. Yi, R. Tso, E. Okamoto, "ID-Based group password-authenticated key exchange," Advances in Information and Computer Security - 4th International Workshop on Security, LNCS vol. 5824, pp. 192-211, 2009.
J. Byun, D. Lee, "N-party encrypted Diffie-Hellman key exchange using different passwords," in Proceedings of 3rd International Conference on Applied Cryptography and Network Security, LNCS vol. 3531, pp. 75-90, 2005.
Byun, S. Lee, D. Lee, D. Hong, "Constant-round password-based group key generation for multi-layer ad-hoc networks," in Proceedings of 3rd International Conference on Security in Pervasive Computing, LNCS vol. 3934, pp. 3-17, 2006.
J. Kwon, I. Jeong, K. Sakurai, D. Lee, "Password-authenticated multi-party key exchange with different passwords," Cryptology ePrint Archive, Report 2006/476, 2006.
D. Boneh, M. Franklin, "Identity-based encryption from the weil pairing," in Proceedings of Crypto'01, LNCS vol. 2139, pp. 213-229, 2001.
D. Boneh, M. Franklin, "Identity based encryption from the Weil pairing," SIAM Journal of Computing, vol. 32, no. 3, pp. 586-615, 2003.
B. Waters, "Efficient identity-based encryption without random oracles," in Proceedings of Eurocrypt'05. LNCS vol. 3494, pp. 114-127, 2005.
C. Gentry, "Practical identity-based encryption without random oracles," in Proceedings of Eurocrypt'06, LNCS vol. 4004, pp. 445-464, 2006.
S. Goldwasser, S. Micali, R. Rivest, "A digital signature scheme secure against adaptive chosen-message attack," SIAM Journal of Computing, vol. 17, no. 2, pp. 281-308, 1988.
D. Galindo, J. Herranz, E. Kiltz, "On the generic construction of identity-based signatures with additional properties," in Proceedings of Asiacrypt'06, LNCS vol. 4284, pp. 178-193, 2006.
K. Paterson, J. Schuldt, "Efficient identity-based signatures secure in the standard model," in Proceedings of Acisp'06, LNCS vol. 4058, pp. 207-222, 2006.
U. Maurer, S. Wolf, "Diffie-Hellman oracles," in Proceedings of Crypto'96, LNCS vol. 1109, pp. 268-282, 1996.
M. Burmester, Y. Desmedt, J. Seberry, "Equitable key escrow with limited time span," in Proceedings of Asiacrypt'98, LNCS vol. 1514, pp. 380-391, 1998.
F. Bao, R. Deng, H. Zhu, "Variations of Diffie-Hellman problem," in Proceedings of ICICS'03, LNCS vol. 2836, pp. 301-312, 2003.
J. Byun, D. Lee, J. Lim, "Password-based group key exchange secure against insider guessing attacks," in Proceedings of 2005 International Conference on Computational Intelligence and Security, LNAI vol. 3802, pp. 143-148, 2005.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.