{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:37:53Z","timestamp":1743082673932,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319018539"},{"type":"electronic","value":"9783319018546"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01854-6_50","type":"book-chapter","created":{"date-parts":[[2013,8,8]],"date-time":"2013-08-08T06:47:25Z","timestamp":1375944445000},"page":"489-498","source":"Crossref","is-referenced-by-count":1,"title":["Provable Secure Constant-Round Group Key Agreement Protocol Based on Secret Sharing"],"prefix":"10.1007","author":[{"given":"Ruxandra F.","family":"Olimid","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","doi-asserted-by":"crossref","unstructured":"Blakley, G.: Safeguarding Cryptographic Keys. In: Proceedings of the 1979 AFIPS National Computer Conference, pp. 313\u2013317 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"50_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-540-24632-9_9","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"E. Bresson","year":"2004","unstructured":"Bresson, E., Catalano, D.: Constant Round Authenticated Group Key Agreement via Distributed Computation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 115\u2013129. Springer, Heidelberg (2004)"},{"key":"50_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-45682-1_18","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"E. Bresson","year":"2001","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 290\u2013309. Springer, Heidelberg (2001)"},{"key":"50_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/3-540-46035-7_21","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"E. Bresson","year":"2002","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 321\u2013336. Springer, Heidelberg (2002)"},{"key":"50_CR5","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.J.: Provably Authenticated Group Diffie-Hellman Key Exchange. In: Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001), pp. 255\u2013264 (2001)","DOI":"10.1145\/501983.502018"},{"key":"50_CR6","doi-asserted-by":"crossref","unstructured":"Bresson, E., Manulis, M.: Securing group key exchange against strong corruptions. In: Proceedings of ASIA CSS 2008, pp. 249\u2013260 (2008)","DOI":"10.1145\/1368310.1368347"},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Cao, C., Yang, C., Ma, J., Moon, S.J.: Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing. EURASIP J. Wireless Comm. and Networking (2008)","DOI":"10.1155\/2008\/271989"},{"key":"50_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-642-00468-1_7","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"M.C. Gorantla","year":"2009","unstructured":"Gorantla, M.C., Boyd, C., Gonz\u00e1lez Nieto, J.M.: Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol.\u00a05443, pp. 105\u2013123. Springer, Heidelberg (2009)"},{"issue":"6","key":"50_CR9","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1109\/TC.2010.40","volume":"59","author":"L. Harn","year":"2010","unstructured":"Harn, L., Lin, C.: Authenticated Group Key Transfer Protocol based on Secret Sharing. IEEE Trans. Comput.\u00a059(6), 842\u2013846 (2010)","journal-title":"IEEE Trans. Comput."},{"key":"50_CR10","unstructured":"Hsu, C., Zeng, B., Cheng, Q., Cui, G.: A Novel Group Key Transfer Protocol. Cryptology ePrint Archive, Report 2012\/043 (2012)"},{"issue":"1","key":"50_CR11","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TIT.1983.1056621","volume":"29","author":"E.D. Karnin","year":"1983","unstructured":"Karnin, E.D., Greene, J.W., Hellman, M.E.: On Secret Sharing Systems. IEEE Transactions on Information Theory\u00a029(1), 35\u201341 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"50_CR12","doi-asserted-by":"crossref","unstructured":"Katz, J., Shin, J.S.: Modeling Insider Attacks on Group Key-Exchange Protocols. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005), pp. 180\u2013189 (2005)","DOI":"10.1145\/1102120.1102146"},{"key":"50_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-642-27142-7_36","volume-title":"Future Generation Information Technology","author":"J. Nam","year":"2011","unstructured":"Nam, J., Kim, M., Paik, J., Jeon, W., Lee, B., Won, D.: Cryptanalysis of a Group Key Transfer Protocol based on Secret Sharing. In: Kim, T.-h., Adeli, H., Slezak, D., Sandnes, F.E., Song, X., Chung, K.-i., Arnett, K.P. (eds.) FGIT 2011. LNCS, vol.\u00a07105, pp. 309\u2013315. Springer, Heidelberg (2011)"},{"key":"50_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-642-36818-9_44","volume-title":"Information and Communicatiaon Technology","author":"R.F. Olimid","year":"2013","unstructured":"Olimid, R.F.: On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol.\u00a07804, pp. 399\u2013408. Springer, Heidelberg (2013)"},{"issue":"4","key":"50_CR15","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.12785\/amis\/070444","volume":"7","author":"R.F. Olimid","year":"2013","unstructured":"Olimid, R.F.: Cryptanalysis of a Password-based Group Key Exchange Protocol Using Secret Sharing. Appl. Math. Inf. Sci.\u00a07(4), 1585\u20131590 (2013)","journal-title":"Appl. Math. Inf. Sci."},{"key":"50_CR16","doi-asserted-by":"crossref","unstructured":"Pieprzyk, J., Li, C.H.: Multiparty Key Agreement Protocols. In: IEEE Proceedings - Computers and Digital Techniques, pp. 229\u2013236 (2000)","DOI":"10.1049\/ip-cdt:20000531"},{"issue":"1","key":"50_CR17","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/S0166-218X(02)00448-1","volume":"128","author":"G. S\u00e1ez","year":"2003","unstructured":"S\u00e1ez, G.: Generation of Key Predistribution Schemes using Secret Sharing Schemes. Discrete Applied Mathematics\u00a0128(1), 239\u2013249 (2003)","journal-title":"Discrete Applied Mathematics"},{"issue":"11","key":"50_CR18","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Commun. ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"50_CR19","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.proeng.2011.12.731","volume":"29","author":"Y. Sun","year":"2012","unstructured":"Sun, Y., Wen, Q., Sun, H., Li, W., Jin, Z., Zhang, H.: An Authenticated Group Key Transfer Protocol based on Secret Sharing. Procedia Engineering\u00a029, 403\u2013408 (2012)","journal-title":"Procedia Engineering"},{"issue":"1","key":"50_CR20","doi-asserted-by":"publisher","first-page":"145","DOI":"10.12785\/amis\/070117","volume":"7","author":"W. Yuan","year":"2013","unstructured":"Yuan, W., Hu, L., Li, H., Chu, J.: An Efficient Password-based Group Key Exchange Protocol Using Secret Sharing. Appl. Math. Inf. Sci.\u00a07(1), 145\u2013150 (2013)","journal-title":"Appl. Math. Inf. Sci."},{"key":"50_CR21","doi-asserted-by":"crossref","unstructured":"Zhao, J., Gu, D., Gorantla, M.C.: Stronger Security Model of Group Key Agreement. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), pp. 435\u2013440 (2011)","DOI":"10.1145\/1966913.1966975"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01854-6_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T15:09:29Z","timestamp":1676819369000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01854-6_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319018539","9783319018546"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01854-6_50","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}