{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:53:08Z","timestamp":1725475988733},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340751"},{"type":"electronic","value":"9783540340768"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751595_39","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T10:27:59Z","timestamp":1147343279000},"page":"355-364","source":"Crossref","is-referenced-by-count":21,"title":["A Framework for Robust Group Key Agreement"],"prefix":"10.1007","author":[{"given":"Jens-Matthias","family":"Bohli","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"39_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"39_CR3","unstructured":"Bohli, J.-M., Gonz\u00e1lez Vasco, M.I., Steinwandt, R.: Secure group key establishment revisited. Cryptology ePrint Archive, Report 2005\/395 (2005), http:\/\/eprint.iacr.org\/2005\/395\/"},{"key":"39_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-45682-1_18","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"E. Bresson","year":"2001","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Provably authenticated group diffie-hellman key exchange - the dynamic case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 290\u2013309. Springer, Heidelberg (2001)"},{"key":"39_CR5","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1145\/501983.502018","volume-title":"ACM CCS","author":"E. Bresson","year":"2001","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably Authenticated Group Diffie-Hellman Key Exchange. In: ACM CCS, pp. 255\u2013264. ACM Press, New York (2001)"},{"key":"39_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Heidelberg (1995)"},{"key":"39_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 453\u2013474. Springer, Heidelberg (2001)"},{"key":"39_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/11593447_32","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"K.-K.R. Choo","year":"2005","unstructured":"Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Examining indistinguishability-based proof models for key establishment protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 585\u2013604. Springer, Heidelberg (2005)"},{"key":"39_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-30598-9_25","volume-title":"Security in Communication Networks","author":"K.-K.R. Choo","year":"2005","unstructured":"Choo, K.-K.R., Boyd, C., Hitchcock, Y., Maitland, G.: On session identifiers in provably secure protocols. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 351\u2013366. Springer, Heidelberg (2005)"},{"key":"39_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/11506157_36","volume-title":"Information Security and Privacy","author":"K.-K.R. Choo","year":"2005","unstructured":"Choo, K.-K.R., Hitchcock, Y.: Security Requirements for Key Establishment Proof Models. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 429\u2013442. Springer, Heidelberg (2005)"},{"key":"39_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-49135-X_29","volume-title":"Security Protocols","author":"D. Gollmann","year":"1999","unstructured":"Gollmann, D.: Insider Fraud (Position Paper). In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol.\u00a01550, pp. 213\u2013219. Springer, Heidelberg (1999)"},{"issue":"5","key":"39_CR12","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","volume":"28","author":"I. Ingemarsson","year":"1982","unstructured":"Ingemarsson, I., Tang, D.T., Wong, C.K.: A Conference Key Distribution System. IEEE Transactions on Information Theory\u00a028(5), 714\u2013720 (1982)","journal-title":"IEEE Transactions on Information Theory"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Katz, J., Shin, J.S.: Modeling Insider Attacks on Group Key-Exchange Protocols. In: ACM CCS (2005)","DOI":"10.1145\/1102120.1102146"},{"key":"39_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J. Katz","year":"2003","unstructured":"Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 110\u2013125. Springer, Heidelberg (2003)"},{"key":"39_CR15","unstructured":"Klein, B., Otten, M., Beth, T.: Conference Key Distribution Protocols in Distributed Systems. In: Cryptography and Coding IV, pp. 225\u2013241. IMA (1993)"},{"key":"39_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/3-540-48970-3_6","volume-title":"Information Security and Privacy","author":"C.-H. Li","year":"1999","unstructured":"Li, C.-H., Pieprzyk, J.: Conference key agreement from secret sharing. In: Pieprzyk, J.P., Safavi-Naini, R., Seberry, J. (eds.) ACISP 1999. LNCS, vol.\u00a01587, pp. 64\u201376. Springer, Heidelberg (1999)"},{"key":"39_CR17","unstructured":"Shoup, V.: On Formal Models for Secure Key Exchange. Cryptology ePrint Archive (1999), http:\/\/eprint.iacr.org\/1999\/012"},{"key":"39_CR18","unstructured":"Steiner, M.: Secure Group Key Agreement. PhD thesis, Universit\u00e4t des Saarlandes (2002), http:\/\/www.semper.org\/sirene\/publ\/Stei_02.thesis-final.pdf"},{"issue":"4","key":"39_CR19","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1093\/comjnl\/bxh111","volume":"48","author":"Y.-M. Tseng","year":"2005","unstructured":"Tseng, Y.-M.: A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants. The Computer Journal\u00a048(4), 480\u2013487 (2005)","journal-title":"The Computer Journal"},{"key":"39_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-46588-1_1","volume-title":"Public Key Cryptography","author":"W.-G. Tzeng","year":"2000","unstructured":"Tzeng, W.-G.: A practical and secure fault-tolerant conference-key agreement protocol. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol.\u00a01751, pp. 1\u201313. Springer, Heidelberg (2000)"},{"key":"39_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1007\/3-540-44448-3_47","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"W.-G. Tzeng","year":"2000","unstructured":"Tzeng, W.-G., Tzeng, Z.-J.: Round-Efficient Conference Key Agreement Protocols with Provable Security. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 614\u2013627. Springer, Heidelberg (2000)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751595_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,7]],"date-time":"2023-05-07T07:31:25Z","timestamp":1683444685000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751595_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340751","9783540340768"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11751595_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}