{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T16:38:31Z","timestamp":1768322311074,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540239758","type":"print"},{"value":"9783540305392","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30539-2_18","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T13:41:57Z","timestamp":1268401317000},"page":"245-259","source":"Crossref","is-referenced-by-count":59,"title":["Constant-Round Authenticated Group Key Exchange for Dynamic Groups"],"prefix":"10.1007","author":[{"given":"Hyun-Jeong","family":"Kim","sequence":"first","affiliation":[]},{"given":"Su-Mi","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Asokan, N., Ginzboorg, P.: Key Agreement in Ad-hoc Networks. Computer Communication, 1627\u20131237 (2000)","DOI":"10.1016\/S0140-3664(00)00249-8"},{"key":"18_CR2","volume-title":"Proc. of the 30th Annual Symposium on the Theory of Computing (STOC)","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to The Design and Analysis of Authentication and Key-Exchange Protocols. In: Proc. of the 30th Annual Symposium on the Theory of Computing (STOC). ACM Press, New York (1998)"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure Against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: Proc. of ACM CCS 1993 (1993)","DOI":"10.1145\/168588.168596"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"18_CR6","volume-title":"Proc. of the 27th Annual Symposium on the Theory of Computing","author":"M. Bellare","year":"1995","unstructured":"Bellare, M., Rogaway, P.: Provably Secure Session Key Distribtuion: The Three Party Case. In: Proc. of the 27th Annual Symposium on the Theory of Computing. ACM Press, New York (1995)"},{"key":"18_CR7","unstructured":"Binkley, J.: Authenticated Ad Hoc Routing at The Link Layer for Mobile Systems. Wireless Network (1999)"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-45539-6_12","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Boyko","year":"2000","unstructured":"Boyko, V., MacKenzie, P.D., Patel, S.: Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 156\u2013171. Springer, Heidelberg (2000)"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/3-540-36288-6_12","volume-title":"Public Key Cryptography - PKC 2003","author":"C. Boyd","year":"2002","unstructured":"Boyd, C., Nietio, J.M.G.: Round-Optimal Contributory Conference Key Agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 161\u2013174. Springer, Heidelberg (2002)"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-540-24632-9_9","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"E. Bresson","year":"2004","unstructured":"Bresson, E., Catalano, D.: Constant Round Authenticated Group Key Agreement via Distributed Computation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 115\u2013129. Springer, Heidelberg (2004)"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Provably Authenticated Group Diffie-Hellman Key Exchange. In: Proc. of the 8th ACM Conference on Computer and Communications Security, pp. 255\u2013264 (2001)","DOI":"10.1145\/501983.502018"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-45682-1_18","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"E. Bresson","year":"2001","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Provably Authenticated Group Diffie-Hellman Key Exchange-The Dynamic Case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 290\u2013309. Springer, Heidelberg (2001)"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/3-540-46035-7_21","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"E. Bresson","year":"2002","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 321\u2013336. Springer, Heidelberg (2002)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Essiari, A., Pointcheval, D.: Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices. In: The Fifth IEEE International Conference on Mobile and Wireless Communications Networks (2003)","DOI":"10.1142\/9789812791146_0013"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 279\u2013290. Springer, Heidelberg (1995)"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Chen, L., Kudla, C.: Identity Based Authenticated Key Agreement Protocols from Pairings. In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), pp. 219\u2013233 (2003)","DOI":"10.1109\/CSFW.2003.1212715"},{"issue":"6","key":"18_CR17","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transanctions on Information Theory IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Transanctions on Information Theory IT"},{"key":"18_CR18","unstructured":"IEEE Std 802.11. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specification (1999 edition)"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J. Katz","year":"2003","unstructured":"Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 110\u2013125. Springer, Heidelberg (2003)"},{"key":"18_CR20","unstructured":"Luo, H., Lu, S.: Ubiquitous and Roubust Authentication Services for Ad Hoc Wireless Networks. Technical Report (2000)"},{"issue":"3","key":"18_CR21","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology\u00a013(3), 361\u2013396 (2000)","journal-title":"Journal of Cryptology"},{"key":"18_CR22","unstructured":"Shoup, V.: On Formal Models for Secure Key Exchange. Technical Report RZ 3120, IBM Zurich Research Lab. (1999)"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: AT&T Software Symposium (1999)","DOI":"10.1007\/10720107_24"},{"key":"18_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1007\/3-540-44448-3_47","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"W.-G. Tzeng","year":"2000","unstructured":"Tzeng, W.-G., Tzeng, Z.-J.: Round Efficient Conference Key Agreement Protocols with Provable Security. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 614\u2013628. Springer, Heidelberg (2000)"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Venkatraman, L., Agrawal, D.P.: A Novel Authentication Scheme for Ad Hoc Networks. In: WCND 2000 (2000)","DOI":"10.1109\/WCNC.2000.904814"},{"key":"18_CR26","unstructured":"Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network (1999)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30539-2_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:59:04Z","timestamp":1605761944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30539-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540239758","9783540305392"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30539-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}