1982
DOI: 10.1109/tit.1982.1056542
|View full text |Cite
|
Sign up to set email alerts
|

A conference key distribution system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
238
0
2

Year Published

2003
2003
2015
2015

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 446 publications
(240 citation statements)
references
References 3 publications
0
238
0
2
Order By: Relevance
“…In [1] the CKDS concept was first introduced. In [2] a CKDS with user anonymity based on an algebraic approach was proposed with the use of one-way hash functions to hide the identities of the attendants.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…In [1] the CKDS concept was first introduced. In [2] a CKDS with user anonymity based on an algebraic approach was proposed with the use of one-way hash functions to hide the identities of the attendants.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…He showed how to compile the so-called family of Group Diffie-Hellman protocols, i.e. protocols such as [13,16,19,24,25,[30][31][32] which extend the classical Diffie-Hellman method to the group setting, in such a way, that at the end of the protocol any pair of users can derive their own p2p key on-demand and without subsequent communication. The main building block of his GKE+P compiler is the parallel Diffie-Hellman key exchange (PDHKE) in which each user broadcasts a value of the form g x and uses x for the derivation of different p2p keys.…”
Section: Related Workmentioning
confidence: 99%
“…The group KE protocols proposed by Ingemarsson et al [43], Burmester and Desmedt [29], and Steiner et al [58] may be the most well-known. Among them, Burmester-Desmedt protocol has been shown to be secure against passive eavesdropping in the standard model by Katz and Yung [48].…”
Section: Group Key Exchangementioning
confidence: 99%
“…A number of works have considered extending the 2-party Diffie-Hellman protocol [36] to the multi-party setting [43,57,29,58,10,50,51]. Among them, the works of Ingemarsson et al [43], Burmester and Desmedt [29], and Steiner et al [58] may be the most well-known. They are merely key exchange (KE) protocols, intended to be secure against a passive adversary only.…”
Section: Introductionmentioning
confidence: 99%