2010
DOI: 10.1109/tmc.2010.150
|View full text |Cite
|
Sign up to set email alerts
|

SPATE: Small-Group PKI-Less Authenticated Trust Establishment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
46
0
1

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 43 publications
(47 citation statements)
references
References 26 publications
0
46
0
1
Order By: Relevance
“…There have been relatively few studies on secure mobile group; however, a number of group security protocols including MultiParty [15], SAS-GMA [16], and SPATE [17] have been proposed. In simple terms, each device sends its public key to every other device via a wireless network, and thus each device generates authentication data independently.…”
Section: Related Workmentioning
confidence: 99%
“…There have been relatively few studies on secure mobile group; however, a number of group security protocols including MultiParty [15], SAS-GMA [16], and SPATE [17] have been proposed. In simple terms, each device sends its public key to every other device via a wireless network, and thus each device generates authentication data independently.…”
Section: Related Workmentioning
confidence: 99%
“…This, the general description, connects an arbitrary-sized group. Good examples of group authentication using HISPs are SiB [15], GAnGs [7] and SPATE [24].…”
Section: Group Hispmentioning
confidence: 99%
“…And such peer-to-peer systems are not efficient when the scale of sharing increases. Practices introduced in [7,24] reveal the high complexity of group HISPs when using physical interactions to collect group information and authenticate members, therefore they are not practical when bootstrapping a large group.…”
Section: Related Researchmentioning
confidence: 99%
“…Moreover, we assume that the N users share a common secret that is utilized to generate a shared public/private key pair (K Mv P , K Mv s ) in an online fashion for each meeting setup instance v. The private key K Mv s generated in this way is known only to all meeting participants, whereas the public key K Mv P is known to everyone including the LDS. This could be achieved through a secure credential establishment protocol such as in [3,4,15].…”
Section: System Architecturementioning
confidence: 99%