{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:44:54Z","timestamp":1725551094840},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121883"},{"type":"electronic","value":"9783642121890"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12189-0_20","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T22:11:05Z","timestamp":1270073465000},"page":"225-235","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Convinced Diffie-Hellman Computation Scheme and Its Cryptographic Application"],"prefix":"10.1007","author":[{"given":"Yuh-Min","family":"Tseng","sequence":"first","affiliation":[]},{"given":"Tsu-Yang","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"20_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"McCurley, K.S.: The discrete logarithm problem. In: Proceedings of Symposia in Applied Mathematics, pp. 49\u201374. AMS press (1990)","DOI":"10.1090\/psapm\/042\/1095551"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/3-540-68697-5_21","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"U.M. Maurer","year":"1996","unstructured":"Maurer, U.M., Wolf, S.: Diffie-Hellman oracles. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 268\u2013282. Springer, Heidelberg (1996)"},{"key":"20_CR4","first-page":"327","volume-title":"Proc. IEEE international symposium on information theory","author":"U.M. Maurer","year":"1998","unstructured":"Maurer, U.M., Wolf, S.: Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms. In: Proc. IEEE international symposium on information theory, p. 327. IEEE press, Los Alamitos (1998)"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/3-540-44448-3_31","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"B. Pfitzmann","year":"2000","unstructured":"Pfitzmann, B., Sadeghi, A.: Anonymous fingerprinting with direct non-repudiation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 401\u2013414. Springer, Heidelberg (2000)"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/978-3-540-39927-8_28","volume-title":"Information and Communications Security","author":"F. Bao","year":"2003","unstructured":"Bao, F., Deng, R.H., Zhu, H.: Variations of Diffie-Hellman problem. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol.\u00a02836, pp. 301\u2013312. Springer, Heidelberg (2003)"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/238168.238182","volume-title":"CCS 1996","author":"M. Steiner","year":"1996","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: CCS 1996, pp. 31\u201337. ACM press, New York (1996)"},{"key":"20_CR8","first-page":"380","volume-title":"ICDCS 1998","author":"M. Steiner","year":"1998","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: A new approach to group key agreement. In: ICDCS 1998, pp. 380\u2013387. IEEE press, Los Alamitos (1998)"},{"issue":"8","key":"20_CR9","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/71.877936","volume":"11","author":"M. Steiner","year":"2000","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Trans. Par. Distrib. Systems\u00a011(8), 769\u2013780 (2000)","journal-title":"IEEE Trans. Par. Distrib. Systems"},{"issue":"5","key":"20_CR10","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1093\/comjnl\/44.5.463","volume":"44","author":"G. Horng","year":"2001","unstructured":"Horng, G.: An efficient and secure protocol for multi-party key establishment. The Computer Journal\u00a044(5), 463\u2013470 (2001)","journal-title":"The Computer Journal"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Heidelberg (1995)"},{"issue":"3","key":"20_CR12","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ipl.2005.01.003","volume":"94","author":"M. Burmester","year":"2005","unstructured":"Burmester, M., Desmedt, Y.: A secure and scalable group key exchange system. Information Processing Letters\u00a094(3), 137\u2013143 (2005)","journal-title":"Information Processing Letters"},{"issue":"4","key":"20_CR13","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.cose.2006.12.001","volume":"26","author":"Y.M. Tseng","year":"2007","unstructured":"Tseng, Y.M.: A resource-constrained group key agreement protocol for imbalanced wireless networks. Computers & Security\u00a026(4), 331\u2013337 (2007)","journal-title":"Computers & Security"},{"issue":"4","key":"20_CR14","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/49.839937","volume":"18","author":"G. Ateniese","year":"2000","unstructured":"Ateniese, G., Steiner, M., Tsudik, G.: New multiparty authentication services and key agreement protocols. IEEE J. Sel. Areas Communications\u00a018(4), 628\u2013639 (2000)","journal-title":"IEEE J. Sel. Areas Communications"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/3-540-36288-6_12","volume-title":"Public Key Cryptography - PKC 2003","author":"C. Boyd","year":"2002","unstructured":"Boyd, C., Nieto, G.: Round-optimal contributory conference key agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 161\u2013174. Springer, Heidelberg (2002)"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/3-540-46035-7_21","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"E. Bresson","year":"2002","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic group diffie-hellman key exchange under standard assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 321\u2013336. Springer, Heidelberg (2002)"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J. Katz","year":"2003","unstructured":"Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 110\u2013125. Springer, Heidelberg (2003)"},{"issue":"10","key":"20_CR18","doi-asserted-by":"publisher","first-page":"2638","DOI":"10.1587\/transfun.E92.A.2638","volume":"E92-A","author":"T.Y. Wu","year":"2009","unstructured":"Wu, T.Y., Tseng, Y.M.: Comments on an ID-based authenticated group key agreement protocol with withstanding insider attacks. IEICE Trans. on Fundamentals of Electronics, Communications of Computer\u00a0E92-A(10), 2638\u20132640 (2009)","journal-title":"IEICE Trans. on Fundamentals of Electronics, Communications of Computer"},{"key":"20_CR19","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1145\/1102120.1102146","volume-title":"CCS 2005","author":"J. Katz","year":"2005","unstructured":"Katz, J., Shin, J.S.: Modeling insider attacks on group key exchange protocols. In: CCS 2005, pp. 180\u2013189. ACM press, New York (2005)"},{"issue":"3","key":"20_CR20","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1049\/iet-ifs:20070113","volume":"2","author":"E. Bresson","year":"2008","unstructured":"Bresson, E., Manulis, M.: Contributory group key exchange in the presence of malicious participants. IET Information Security\u00a02(3), 85\u201393 (2008)","journal-title":"IET Information Security"},{"issue":"4","key":"20_CR21","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1093\/comjnl\/bxh111","volume":"48","author":"Y.M. Tseng","year":"2005","unstructured":"Tseng, Y.M.: A robust multi-party key agreement protocol resistant to malicious participants. The Computer Journal\u00a048(4), 480\u2013487 (2005)","journal-title":"The Computer Journal"},{"key":"20_CR22","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/168588.168596","volume-title":"CCS 1993","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: CCS 1993, pp. 62\u201373. ACM press, New York (1993)"},{"issue":"4","key":"20_CR23","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1145\/1008731.1008734","volume":"51","author":"R. Canetti","year":"2004","unstructured":"Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. Journal of ACM\u00a051(4), 557\u2013594 (2004)","journal-title":"Journal of ACM"},{"issue":"4","key":"20_CR24","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public-Key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"20_CR25","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient Signature Generation by Smart Cards. Journal of Cryptology\u00a04(3), 161\u2013174 (1991)","journal-title":"Journal of Cryptology"},{"key":"20_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/3-540-68339-9_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"D. Pointcheval","year":"1996","unstructured":"Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 387\u2013398. Springer, Heidelberg (1996)"},{"issue":"3","key":"20_CR27","first-page":"361","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. Journal of Cryptography\u00a013(3), 361\u2013396 (2000)","journal-title":"Journal of Cryptography"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12189-0_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:50:36Z","timestamp":1606186236000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12189-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121883","9783642121890"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12189-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}