{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:39:49Z","timestamp":1725867589963},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319474212"},{"type":"electronic","value":"9783319474229"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47422-9_12","type":"book-chapter","created":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T21:26:41Z","timestamp":1476221201000},"page":"207-226","source":"Crossref","is-referenced-by-count":4,"title":["Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction"],"prefix":"10.1007","author":[{"given":"Kazuki","family":"Yoneyama","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reo","family":"Yoshida","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuto","family":"Kawahara","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tetsutaro","family":"Kobayashi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hitoshi","family":"Fuji","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tomohide","family":"Yamamoto","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,10,13]]},"reference":[{"key":"12_CR1","unstructured":"Berjon, R., Leithead, T., Navara, E.D., O\u2019Connor, E., Pfeiffer, S.: HTML5. In: W3C Working Draft (2012)"},{"key":"12_CR2","unstructured":"Marshall, J.: Google chrome will begin blocking flash web ads. In: The Wall Street Journal (2015)"},{"key":"12_CR3","unstructured":"Chesters, J.: Mozilla blocks flash, encourages HTML5 adoption. In: InfoQ (2015)"},{"key":"12_CR4","unstructured":"Bergkvist, A., Burnett, D.C., Jennings, C., Narayanan, A., Aboba, B.: WebRTC 1.0: real-time communication between browsers. In: InfoQ (2015)"},{"key":"12_CR5","unstructured":"Westerlund, M., Wenger, S.: RTP topologies, draft-ietf-avtcore-rtp-topologies-update-10. In: IETF Draft (2015). https:\/\/tools.ietf.org\/html\/draft-ietf-avtcore-rtp-topologies-update-10"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Casner, S.L., Frederick, R., Jacobson, V.: RTP: a transport protocol for real-time applications. In: IEFT RFC 3550 (2003)","DOI":"10.17487\/rfc3550"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Fischl, J., Tschofenig, H., Rescorla, E.: Framework for establishing a secure real-time transport protocol (SRTP), security context using datagram transport layer security (DTLS). In: IEFT RFC 5763 (2010)","DOI":"10.17487\/rfc5763"},{"key":"12_CR8","unstructured":"Rescorla, E.: WebRTC security architecture, draft-ietf-rtcweb-security-arch-12. In: IETF Draft (2015). https:\/\/tools.ietf.org\/html\/draft-ietf-rtcweb-security-arch-12"},{"key":"12_CR9","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/s10623-014-9972-2","volume":"76","author":"A Fujioka","year":"2015","unstructured":"Fujioka, A., Suzuki, K., Xagawa, K., Yoneyama, K.: Strongly secure authenticated key exchange from factoring, codes, and lattices. Des. Codes Crypt. 76, 469\u2013504 (2015)","journal-title":"Des. Codes Crypt."},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/978-3-319-04852-9_20","volume-title":"Topics in Cryptology \u2013 CT-RSA 2014","author":"K Kurosawa","year":"2014","unstructured":"Kurosawa, K., Furukawa, J.: 2-pass key exchange protocols from CPA-secure KEM. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 385\u2013401. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-04852-9_20"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.: Provably authenticated group Diffie-Hellman key exchange. In: Reiter, M.K., Samarati, P., (eds.) CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, 6\u20138 November 2001, pp. 255\u2013264. ACM (2001)","DOI":"10.1145\/501983.502018"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-45682-1_18","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"E Bresson","year":"2001","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Provably authenticated group Diffie-Hellman key exchange \u2014 the dynamic case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 290\u2013309. Springer, Heidelberg (2001). doi: 10.1007\/3-540-45682-1_18"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/3-540-46035-7_21","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2002","author":"E Bresson","year":"2002","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic group Diffie-Hellman key exchange under standard assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 321\u2013336. Springer, Heidelberg (2002). doi: 10.1007\/3-540-46035-7_21"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-540-30539-2_18","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"H-J Kim","year":"2004","unstructured":"Kim, H.-J., Lee, S.-M., Lee, D.H.: Constant-round authenticated group key exchange for dynamic groups. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 245\u2013259. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-30539-2_18"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/11556992_6","volume-title":"Information Security","author":"R Dutta","year":"2005","unstructured":"Dutta, R., Barua, R.: Constant round dynamic group key agreement. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 74\u201388. Springer, Heidelberg (2005). doi: 10.1007\/11556992_6"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-642-17619-7_19","volume-title":"Cryptology and Network Security","author":"G Yang","year":"2010","unstructured":"Yang, G., Tan, C.H.: Dynamic group key exchange revisited. In: Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. LNCS, vol. 6467, pp. 261\u2013277. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-17619-7_19"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-14423-3_2","volume-title":"Information, Security and Cryptology \u2013 ICISC 2009","author":"M Manulis","year":"2010","unstructured":"Manulis, M., Suzuki, K., Ustaoglu, B.: Modeling leakage of ephemeral secrets in tripartite\/group key exchange. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 16\u201333. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14423-3_2"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1007\/978-3-642-38980-1_29","volume-title":"Applied Cryptography and Network Security","author":"K Suzuki","year":"2013","unstructured":"Suzuki, K., Yoneyama, K.: Exposure-resilient one-round tripartite key exchange without random oracles. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 458\u2013474. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-38980-1_29"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Caronni, G., Waldvogel, M., Sun, D., Plattner, B.: Efficient security for large and dynamic multicast groups. In: Proceedings of 7th Workshop on Enabling Technologies (WETICE 1998), Infrastructure for Collaborative Enterprises, 17\u201319 June 1998, Palo Alto, CAUSA, pp. 376\u2013383. IEEE Computer Society (1998)","DOI":"10.1109\/ENABL.1998.725721"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Canetti, R., Garay, J.A., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: a taxonomy and some efficient constructions. In: Proceedings IEEE INFOCOM 1999, The Conference on Computer Communications, Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, The Future Is Now, New York, NY, USA, 21\u201325 March 1999, pp. 708\u2013716. IEEE (1999)","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"12_CR21","doi-asserted-by":"crossref","first-page":"1614","DOI":"10.1109\/49.790485","volume":"17","author":"M Waldvogel","year":"1999","unstructured":"Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The versakey framework: versatile group key management. IEEE J. Sel. Areas Commun. 17, 1614\u20131631 (1999)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"12_CR22","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1109\/TSE.2003.1199073","volume":"29","author":"AT Sherman","year":"2003","unstructured":"Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Softw. Eng. 29, 444\u2013458 (2003)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"12_CR23","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1093\/comjnl\/bxp060","volume":"53","author":"I Lin","year":"2010","unstructured":"Lin, I., Tang, S., Wang, C.: Multicast key management without rekeying processes. Comput. J. 53, 939\u2013950 (2010)","journal-title":"Comput. J."},{"issue":"6","key":"12_CR24","doi-asserted-by":"crossref","first-page":"951","DOI":"10.3844\/jcssp.2012.951.956","volume":"8","author":"K Saravanan","year":"2012","unstructured":"Saravanan, K., Purusothaman, T.: Efficient star topology based multicast key management algorithm. J. Comput. Sci. 8(6), 951\u2013956 (2012)","journal-title":"J. Comput. Sci."},{"issue":"3","key":"12_CR25","first-page":"3777","volume":"5","author":"N Mittal","year":"2014","unstructured":"Mittal, N., Kumar, V.: An efficient and secure multicast key management scheme based on star topology. Int. J. Comput. Sci. Inf. Technol. 5(3), 3777\u20133783 (2014)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"12_CR26","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.ins.2015.01.037","volume":"321","author":"H Sun","year":"2015","unstructured":"Sun, H., He, B., Chen, C., Wu, T., Lin, C., Wang, H.: A provable authenticated group key agreement protocol for mobile environment. Inf. Sci. 321, 224\u2013237 (2015)","journal-title":"Inf. Sci."},{"key":"12_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-24676-3_10","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Micciancio","year":"2004","unstructured":"Micciancio, D., Panjwani, S.: Optimal communication complexity of generic multicast key distribution. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 153\u2013170. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24676-3_10"},{"issue":"A","key":"12_CR28","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1587\/transfun.E97.A.1345","volume":"97","author":"K Suzuki","year":"2014","unstructured":"Suzuki, K., Yoneyama, K.: Exposure-resilient one-round tripartite key exchange without randomoracles. IEICE Trans. 97(A), 1345\u20131355 (2014)","journal-title":"IEICE Trans."},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Yoneyama, K., Yoshida, R., Kawahara, Y., Kobayashi, T., Fuji, H., Yamamoto, T.: Multi-cast key distribution: scalable, dynamic and provably secure construction. In: Cryptology ePrint Archive: 2016\/833 (2016)","DOI":"10.1007\/978-3-319-47422-9_12"},{"key":"12_CR30","unstructured":"Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. In: Cryptology ePrint Archive: 2004\/332 (2004)"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47422-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T09:28:15Z","timestamp":1568453295000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47422-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319474212","9783319474229"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47422-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}