{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:16:01Z","timestamp":1767183361717,"version":"3.37.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319063195"},{"type":"electronic","value":"9783319063201"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06320-1_36","type":"book-chapter","created":{"date-parts":[[2014,4,27]],"date-time":"2014-04-27T20:59:27Z","timestamp":1398632367000},"page":"496-510","source":"Crossref","is-referenced-by-count":9,"title":["Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement"],"prefix":"10.1007","author":[{"given":"Lei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"WenChang","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"S.S. Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 452\u2013473. Springer, Heidelberg (2003)"},{"key":"36_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/11426639_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"D. Boneh","year":"2005","unstructured":"Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 440\u2013456. Springer, Heidelberg (2005)"},{"key":"36_CR3","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1090\/conm\/324\/05731","volume":"324","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Silverberg, A.: Applications of multilinear forms to cryptography. Contemporary Mathematics\u00a0324, 71\u201390 (2003)","journal-title":"Contemporary Mathematics"},{"key":"36_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/3-540-36288-6_12","volume-title":"Public Key Cryptography - PKC 2003","author":"C. Boyd","year":"2002","unstructured":"Boyd, C., Gonz\u00e1lez-Nieto, J.: Round-optimal contributory conference key agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 161\u2013174. Springer, Heidelberg (2002)"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Boyd, C., Mathuria, A.: Protocols for authentication and key establishment, pp. 9\u201310. Springer (2003) ISBN:3-540-43107-1","DOI":"10.1007\/978-3-662-09527-0_1"},{"key":"36_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-540-24632-9_9","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"E. Bresson","year":"2004","unstructured":"Bresson, E., Catalano, D.: Constant round authenticated group key agreement via distributed computation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 115\u2013129. Springer, Heidelberg (2004)"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.: Provably authenticated group Diffie-Hellman key exchange. In: ACM CCS 2001, pp. 255\u2013264 (2001)","DOI":"10.1007\/3-540-45682-1_18"},{"key":"36_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Heidelberg (1995)"},{"key":"36_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-540-24632-9_10","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"K.Y. Choi","year":"2004","unstructured":"Choi, K.Y., Hwang, J.Y., Lee, D.H.: Efficient ID-based group key agreement with bilinear maps. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 130\u2013144. Springer, Heidelberg (2004)"},{"key":"36_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-540-78440-1_20","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"A.W. Dent","year":"2008","unstructured":"Dent, A.W., Libert, B., Paterson, K.G.: Certificateless encryption schemes strongly secure in the standard model. In: Cramer, R. (ed.) PKC 2008. LNCS, vol.\u00a04939, pp. 344\u2013359. Springer, Heidelberg (2008)"},{"issue":"5","key":"36_CR11","doi-asserted-by":"publisher","first-page":"2007","DOI":"10.1109\/TIT.2008.920224","volume":"54","author":"R. Dutta","year":"2008","unstructured":"Dutta, R., Barua, R.: Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans. Inf. Theory\u00a054(5), 2007\u20132025 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"36_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"E. Fujisaki","year":"1999","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 537\u2013554. Springer, Heidelberg (1999)"},{"key":"36_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-38348-9_1","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"S. Garg","year":"2013","unstructured":"Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol.\u00a07881, pp. 1\u201317. Springer, Heidelberg (2013)"},{"key":"36_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/978-3-540-73458-1_23","volume-title":"Information Security and Privacy","author":"X. Huang","year":"2007","unstructured":"Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signature revisited. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol.\u00a04586, pp. 308\u2013322. Springer, Heidelberg (2007)"},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Katz, J., Shin, J.: Modeling insider attacks on group key-exchange protocols. In: ACM CCS 2005, pp. 180\u2013189 (2005)","DOI":"10.1145\/1102120.1102146"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Lv, X., Li, H., Wang, B.: Authenticated asymmetric group key agreement based on certificateless cryptosystem. International Journal of Computer Mathematics (2013), \n                    \n                      http:\/\/dx.doi.org\/10.1080\/00207160.2013.806653","DOI":"10.1080\/00207160.2013.806653"},{"key":"36_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Wei, G., Yang, X., Shao, J.: Efficient certificateless authenticated asymmetric group key agreement protocol. KSII Transactions on Internet and Information Systems\u00a06(12) (2012)","DOI":"10.3837\/tiis.2012.12.018"},{"key":"36_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-642-01001-9_9","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"Q. Wu","year":"2009","unstructured":"Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 153\u2013170. Springer, Heidelberg (2009)"},{"key":"36_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-25385-0_8","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"Q. Wu","year":"2011","unstructured":"Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farr\u00e0s, O.: Bridging Broadcast Encryption and Group Key Agreement. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol.\u00a07073, pp. 143\u2013160. Springer, Heidelberg (2011)"},{"issue":"2","key":"36_CR21","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/TNET.2012.2208201","volume":"21","author":"Q. Wu","year":"2013","unstructured":"Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Manj\u00f3n, J.A.: Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm. IEEE\/ACM Trans. Netw.\u00a021(2), 621\u2013633 (2013)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"36_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-642-14031-0_54","volume-title":"Computing and Combinatorics","author":"L. Zhang","year":"2010","unstructured":"Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based authenticated asymmetric group key agreement protocol. In: Thai, M.T., Sahni, S. (eds.) COCOON 2010. LNCS, vol.\u00a06196, pp. 510\u2013519. Springer, Heidelberg (2010)"},{"issue":"15","key":"36_CR23","doi-asserted-by":"publisher","first-page":"3246","DOI":"10.1016\/j.comnet.2011.06.016","volume":"55","author":"L. Zhang","year":"2011","unstructured":"Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement protocol for open networks and its application to broadcast encryption. Computer Networks\u00a055(15), 3246\u20133255 (2011)","journal-title":"Computer Networks"},{"issue":"6","key":"36_CR24","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1016\/j.ins.2009.11.036","volume":"180","author":"L. Zhang","year":"2010","unstructured":"Zhang, L., Zhang, F., Wu, Q., Domingo-Ferrer, J.: Simulatable certificateless two-party authenticated key agreement protocol. Information Sciences\u00a0180(6), 1020\u20131030 (2010)","journal-title":"Information Sciences"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06320-1_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T13:52:16Z","timestamp":1558878736000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06320-1_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319063195","9783319063201"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06320-1_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}