{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:54:02Z","timestamp":1725490442961},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744757"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74477-1_89","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T19:15:06Z","timestamp":1188328506000},"page":"996-1007","source":"Crossref","is-referenced-by-count":2,"title":["Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification"],"prefix":"10.1007","author":[{"given":"Seokhyang","family":"Cho","sequence":"first","affiliation":[]},{"given":"Kiwon","family":"Song","sequence":"additional","affiliation":[]},{"given":"Dongsub","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"89_CR1","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/49.839937","volume":"18","author":"G. Ateniese","year":"2000","unstructured":"Ateniese, G., Steiner, M., Tsudik, G.: New multiparty authentication services and key agreement protocols. IEEE Journal on Selected Areas in Communications\u00a018(4), 628\u2013639 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"89_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/978-3-540-24632-9_9","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"E. Bresson","year":"2004","unstructured":"Bresson, E., Catalano, D.: Constant round authenticated group key agreement via distributed computation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 115\u2013129. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Essiari, A., Pointcheval, D.: Mutual authentication and group key agreement for low-power mobile devices. In: Proc. of MWCN\u201903, pp. 59\u201362 (2003)","key":"89_CR3","DOI":"10.1142\/9789812791146_0013"},{"key":"89_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-45682-1_18","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"E. Bresson","year":"2001","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Provably authenticated group Diffie-Hellman key exchange \u2014 the dynamic case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 290\u2013309. Springer, Heidelberg (2001)"},{"key":"89_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/3-540-46035-7_21","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"E. Bresson","year":"2002","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic group Diffie-Hellman key exchange under standard assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 321\u2013336. Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably authenticated group Diffie-Hellman key exchange. In: Proc. of CCS\u201901, pp. 255\u2013264 (2001)","key":"89_CR6","DOI":"10.1145\/501983.502018"},{"key":"89_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Heidelberg (1995)"},{"key":"89_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"89_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/3-540-45708-9_23","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"P. Barreto","year":"2002","unstructured":"Barreto, P., Kim, H., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 354\u2013369. Springer, Heidelberg (2002)"},{"key":"89_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/3-540-36288-6_12","volume-title":"Public Key Cryptography - PKC 2003","author":"C. Boyd","year":"2002","unstructured":"Boyd, C., Nieto, J.M.G.: Round-optimal contributory conference key agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 161\u2013174. Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Becker, K., Wille, U.: Communication complexity of group key distribution. In: Proc. of CCS\u201998, pp. 1\u20136 (1998)","key":"89_CR11","DOI":"10.1145\/288090.288094"},{"key":"89_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1007\/11593447_34","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"K.R. Choo","year":"2005","unstructured":"Choo, K.R., Boyd, C., Hitchcock, Y.: Errors in computational complexity proofs for protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 624\u2013643. Springer, Heidelberg (2005)"},{"key":"89_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1007\/978-3-540-24632-9_10","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"K.Y. Choi","year":"2004","unstructured":"Choi, K.Y., Hwang, J.Y., Lee, D.H.: Efficient ID-based group key agreement with bilinear maps. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 130\u2013144. Springer, Heidelberg (2004)"},{"key":"89_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1007\/11506157_41","volume-title":"Information Security and Privacy","author":"K.Y. Choi","year":"2005","unstructured":"Choi, K.Y., Hwang, J.Y., Lee, D.H., Seo, I.S.: ID-based authenticated key agreement for low-power mobile devices. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 494\u2013505. Springer, Heidelberg (2005)"},{"key":"89_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/11556992_6","volume-title":"Information Security","author":"R. Dutta","year":"2005","unstructured":"Dutta, R., Barua, R.: Constant round dynamic group key agreement. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol.\u00a03650, pp. 74\u201388. Springer, Heidelberg (2005)"},{"key":"89_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/3-540-36492-7_20","volume-title":"Selected Areas in Cryptography","author":"F. Hess","year":"2003","unstructured":"Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 310\u2013324. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Huang, Y., Garcia-Molina, H.: Publish\/subscribe in a mobile environment. In: Proc. of MobiDE\u201901, pp. 27\u201334 (2001)","key":"89_CR17","DOI":"10.1145\/376868.376889"},{"issue":"5","key":"89_CR18","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","volume":"28","author":"I. Ingemarsson","year":"1982","unstructured":"Ingemarsson, I., Tang, D., Wong, C.: A conference key distribution system. IEEE Trans. on Information Theory\u00a028(5), 714\u2013720 (1982)","journal-title":"IEEE Trans. on Information Theory"},{"key":"89_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/BFb0034833","volume-title":"Advances in Cryptology - ASIACRYPT \u201996","author":"M. Just","year":"1996","unstructured":"Just, M., Vaudenay, S.: Authenticated multi-party key agreement. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol.\u00a01163, pp. 36\u201349. Springer, Heidelberg (1996)"},{"key":"89_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/978-3-540-30539-2_18","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"H.J. Kim","year":"2004","unstructured":"Kim, H.J., Lee, S.M., Lee, D.H.: Constant-round authenticated group key exchange for dynamic groups. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 245\u2013259. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Katz, J., Shin, J.S.: Modeling insider attacks on group key-exchange protocols. In: Proc. of CCS\u201905, pp. 180\u2013189 (2005)","key":"89_CR21","DOI":"10.1145\/1102120.1102146"},{"key":"89_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J. Katz","year":"2003","unstructured":"Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 110\u2013125. Springer, Heidelberg (2003)"},{"issue":"8","key":"89_CR23","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/71.877936","volume":"11","author":"M. Steiner","year":"2000","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Trans. on Parallel and Distributed Systems\u00a011(8), 769\u2013780 (2000)","journal-title":"IEEE Trans. on Parallel and Distributed Systems"},{"key":"89_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1007\/3-540-44448-3_47","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"W.-G. Tzeng","year":"2000","unstructured":"Tzeng, W.-G., Tzeng, Z.-J.: Round-efficient conference key agreement protocols with provable security. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 614\u2013627. Springer, Heidelberg (2000)"},{"key":"89_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/11890348","volume-title":"Information Security and Cryptology - ICISC 2005","author":"H.J. Yoon","year":"2006","unstructured":"Yoon, H.J., Cheon, J.H., Kim, Y.: Batch verifications with ID-based signatures. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol.\u00a03935, pp. 233\u2013248. Springer, Heidelberg (2006)"},{"key":"89_CR26","first-page":"191","volume-title":"Information Processing Letters archive","author":"F. Zhang","year":"2004","unstructured":"Zhang, F., Chen, X.: Attack on an ID-based authenticated group key agreement scheme from PKC 2004. In: Information Processing Letters archive, vol.\u00a091(4), pp. 191\u2013193. Elsevier Science Inc., Amsterdam (2004)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74477-1_89.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:32:38Z","timestamp":1619519558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74477-1_89"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744757"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74477-1_89","relation":{},"subject":[]}}