{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T01:53:45Z","timestamp":1762998825816},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540406747"},{"type":"electronic","value":"9783540451464"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45146-4_7","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T21:51:19Z","timestamp":1277243479000},"page":"110-125","source":"Crossref","is-referenced-by-count":211,"title":["Scalable Protocols for Authenticated Group Key Exchange"],"prefix":"10.1007","author":[{"given":"Jonathan","family":"Katz","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Tripartite Authenticated Key Agreement Protocols from Pairings, Available at http:\/\/eprint.iacr.org\/2002\/035\/","DOI":"10.1007\/978-3-540-40974-8_27"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Steiner, M., Tsudik, G.: Authenticated Group Key Agreement and Friends. In: ACM CCCS 1998 (1998)","DOI":"10.1145\/288090.288097"},{"issue":"4","key":"7_CR3","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/49.839937","volume":"18","author":"G. Ateniese","year":"2000","unstructured":"Ateniese, G., Steiner, M., Tsudik, G.: New Multi-Party Authentication Services and Key Agreement Protocols. IEEE Journal on Selected Areas in Communications\u00a018(4), 628\u2013639 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: STOC 1998 (1998)","DOI":"10.1145\/276698.276854"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure Against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, p. 139. Springer, Heidelberg (2000)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Provably-Secure Session Key Distribution: the Three Party Case. In: STOC 1995 (1995)","DOI":"10.1145\/225058.225084"},{"issue":"5","key":"7_CR8","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/49.223869","volume":"11","author":"R. Bird","year":"1993","unstructured":"Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M.: Systematic Design of Two-Party Authentication Protocols. IEEE J. on Selected Areas in Communications\u00a011(5), 679\u2013693 (1993); A preliminary version appeared in Crypto 1991","journal-title":"IEEE J. on Selected Areas in Communications"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0027936","volume-title":"Information Security and Privacy","author":"C. Boyd","year":"1997","unstructured":"Boyd, C.: On Key Agreement and Conference Key Agreement. In: Mu, Y., Pieprzyk, J.P., Varadharajan, V. (eds.) ACISP 1997. LNCS, vol.\u00a01270, Springer, Heidelberg (1997)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/3-540-36288-6_12","volume-title":"Public Key Cryptography - PKC 2003","author":"C. Boyd","year":"2002","unstructured":"Boyd, C., Nieto, J.M.G.: Round-Optimal Contributory Conference Key Agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 161\u2013174. Springer, Heidelberg (2002)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-45682-1_18","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"E. Bresson","year":"2001","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Provably Authenticated Group Diffie-Hellman Key Exchange \u2014 The Dynamic Case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, p. 290. Springer, Heidelberg (2001)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/3-540-46035-7_21","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"E. Bresson","year":"2002","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, p. 321. Springer, Heidelberg (2002)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably Authenticated Group Diffie-Hellman Key Exchange. In: ACM CCCS 2001 (2001)","DOI":"10.1145\/501983.502018"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Heidelberg (1995)"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, p. 453. Springer, Heidelberg (2001)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/3-540-46035-7_22","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"R. Canetti","year":"2002","unstructured":"Canetti, R., Krawczyk, H.: Universally Composable Notions of Key Exchange and Secure Channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, p. 337. Springer, Heidelberg (2002)"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/3-540-45708-9_10","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"R. Canetti","year":"2002","unstructured":"Canetti, R., Krawczyk, H.: Security Analysis of IKE\u2019s Signature-Based Key- Exchange Protocol. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, p. 143. Springer, Heidelberg (2002)"},{"key":"7_CR18","unstructured":"Desmedt, Y.: Personal communication (including a copy of the pre-proceedings version of [14]) (March 2003)"},{"issue":"6","key":"7_CR19","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"7_CR20","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Diffie, W., van Oorschot, P., Wiener, M.: Authentication and Authenticated Key Exchanges. Designs, Codes, and Cryptography\u00a02(2), 107\u2013125 (1992)","journal-title":"Designs, Codes, and Cryptography"},{"issue":"2","key":"7_CR21","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1145\/3149.214121","volume":"32","author":"M. Fischer","year":"1985","unstructured":"Fischer, M., Lynch, N., Patterson, M.: Impossibility of Distributed Consensus with One Faulty Process. J. ACM\u00a032(2), 374\u2013382 (1985)","journal-title":"J. ACM"},{"issue":"5","key":"7_CR22","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","volume":"28","author":"I. Ingemarsson","year":"1982","unstructured":"Ingemarsson, I., Tang, D.T., Wong, C.K.: A Conference Key Distribution System. IEEE Transactions on Information Theory\u00a028(5), 714\u2013720 (1982)","journal-title":"IEEE Transactions on Information Theory"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Joux, A.: A One Round Protocol for Tripartite Diffie Hellman. In: ANTS 2000(2000)","DOI":"10.1007\/10722028_23"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","volume-title":"Authenticated Multi-Party Key Agreement","author":"M. Just","year":"1996","unstructured":"Just, M., Vaudenay, S.: Authenticated Multi-Party Key Agreement. In: ASIACRYPT 1996. LNCS, vol.\u00a01163. Springer, Heidelberg (1996)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: SKEME: A Versatile Secure Key-Exchange Mechanism for the Internet. In: Proceedings of the Internet Society Symposium on Network and Distributed System Security, Febrauary 1996, pp. 114\u2013127 (1996)","DOI":"10.1109\/NDSS.1996.492418"},{"key":"7_CR26","unstructured":"Lee, H.-K., Lee, H.-S., Lee, Y.-R.: Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms, Available at http:\/\/eprint.iacr.org\/2002\/166\/"},{"key":"7_CR27","unstructured":"Lee, H.-K., Lee, H.-S., Lee, Y.-R.: An Authenticated Group Key Agreement Protocol on Braid groups, Available at http:\/\/eprint.iacr.org\/2003\/018\/"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Mayer, A., Yung, M.: Secure Protocol Transformation via \u201cExpansion\u201d: From Two-Party to Groups. In: ACM CCCS 1999 (1999)","DOI":"10.1145\/319709.319721"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Pereira, O., Quisquater, J.-J.: A Security Analysis of the Cliques Protocol Suites. In: IEEE Computer Security Foundations Workshop (June 2001)","DOI":"10.1109\/CSFW.2001.930137"},{"key":"7_CR30","unstructured":"Shoup, V.: On Formal Models for Secure Key Exchange. Draft (1999), Available at http:\/\/eprint.iacr.org\/1999\/012"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Tzeng, W.-G.: A Practical and Secure Fault-Tolerant Conference Key Agreement Protocol. In: PKC 2000 (2000)","DOI":"10.1007\/978-3-540-46588-1_1"},{"issue":"8","key":"7_CR32","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/71.877936","volume":"11","author":"M. Steiner","year":"2000","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Key Agreement in Dynamic Peer Groups. IEEE Trans. on Parallel and Distributed Systems\u00a011(8), 769\u2013780 (2000); A preliminary version appeared in ACM CCCS 1996","journal-title":"IEEE Trans. on Parallel and Distributed Systems"},{"key":"7_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1007\/3-540-44448-3_47","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"W.-G. Tzeng","year":"2000","unstructured":"Tzeng, W.-G., Tzeng, Z.-J.: Round Efficient Conference Key Agreement Protocols with Provable Security. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, p. 614. Springer, Heidelberg (2000)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - CRYPTO 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45146-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T09:51:47Z","timestamp":1559209907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45146-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540406747","9783540451464"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45146-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}