2014
DOI: 10.1007/s10207-013-0225-6
|View full text |Cite
|
Sign up to set email alerts
|

Tuning a two-round group key agreement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…We therefore desire non-interactive solutions that allow the initiator to complete their actions before any recipients come online, and do not require any interaction between the recipients. This rules out traditional group key exchange protocols [5,2,18,3,13].…”
Section: Secure Sharing and Forward Secrecymentioning
confidence: 98%
See 2 more Smart Citations
“…We therefore desire non-interactive solutions that allow the initiator to complete their actions before any recipients come online, and do not require any interaction between the recipients. This rules out traditional group key exchange protocols [5,2,18,3,13].…”
Section: Secure Sharing and Forward Secrecymentioning
confidence: 98%
“…We need a group key exchange protocol that is non-interactive with respect to the initiator and the responders, and that at the same time provides forward secrecy. [14,16,12] b 2 GKE [5,2,18,3,13] N Mona [22], Tresorit [20,21] N Chu et al We overcome these obstacles by noting that the cloud server is online at all times, and use ephemeral values provided by the cloud server to give us forward secrecy. This allows us to achieve the best possible level of forward secrecy in our collaboration scenario, without trusting the cloud server.…”
Section: Contributionsmentioning
confidence: 99%
See 1 more Smart Citation