{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T22:58:20Z","timestamp":1696892300824},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T00:00:00Z","timestamp":1221523200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2009,2]]},"DOI":"10.1007\/s10207-008-0062-1","type":"journal-article","created":{"date-parts":[[2008,9,15]],"date-time":"2008-09-15T08:09:09Z","timestamp":1221466149000},"page":"37-48","source":"Crossref","is-referenced-by-count":14,"title":["Conference key agreement protocol with non-interactive fault-tolerance over broadcast network"],"prefix":"10.1007","volume":"8","author":[{"given":"Jiin-Chiou","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Chi-Sung","family":"Laih","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,9,16]]},"reference":[{"issue":"17","key":"62_CR1","doi-asserted-by":"crossref","first-page":"1627","DOI":"10.1016\/S0140-3664(00)00249-8","volume":"23","author":"N. Asokan","year":"2000","unstructured":"Asokan N. and Ginzboorg P. (2000). Key agreement in ad hoc networks. Comput. Commun. 23(17): 1627\u20131637","journal-title":"Comput. Commun."},{"key":"62_CR2","doi-asserted-by":"crossref","unstructured":"Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: Proceedings of Eurocrypt\u201994. LNCS, vol. 950, pp. 275\u2013286 (1995)","DOI":"10.1007\/BFb0053443"},{"key":"62_CR3","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Proceedings of Crypto\u201901. LNCS, vol. 2139, pp. 213\u2013229 (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"62_CR4","doi-asserted-by":"crossref","unstructured":"Boyd, C., Gonzalez Nieto, J.: Round-optimal contributory conference key agreement. In: Public Key Cryptography\u2014PKC 2003. LNCS, vol. 2567, pp. 161\u2013174 (2003)","DOI":"10.1007\/3-540-36288-6_12"},{"key":"62_CR5","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of 20th ACM Symposium on Theory of Computing , pp. 1\u201310 (1988)","DOI":"10.1145\/62212.62213"},{"key":"62_CR6","doi-asserted-by":"crossref","unstructured":"Barreto, P., Kim, H. Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Proceedings of Crypto\u201902. LNCS, vol. 2442, pp. 354-369 (2002)","DOI":"10.1007\/3-540-45708-9_23"},{"key":"62_CR7","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of First ACM Computer and Communication Security, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"62_CR8","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: The exact security of digital signature\u2014how to sign with RSA and Rabin. In: Proceedings of Eurocrypt\u201996. LNCS, vol. 1070, pp. 399\u2013416 (1996)","DOI":"10.1007\/3-540-68339-9_34"},{"key":"62_CR9","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"I.F. Blake","year":"1999","unstructured":"Blake I.F., Seroussi G. and Smart N.P. (1999). Elliptic Curves in Cryptography. Cambridge University Press, Cambridge"},{"key":"62_CR10","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie W. and Hellman M. (1976). New directions in cryptography. IEEE Trans. Inform. Theory 22: 644\u2013654","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"1","key":"62_CR11","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1049\/ip-cdt:19949890","volume":"141","author":"T.L. Hwang","year":"1994","unstructured":"Hwang T.L. and Chen J.L. (1994). Identity-based conference key broadcast systems. IEE Proc. Comput. Digit. Tech. 141(1): 57\u201360","journal-title":"IEE Proc. Comput. Digit. Tech."},{"key":"62_CR12","unstructured":"Klein, B., Otten, M., Beth, T.: Conference key distribution protocols in distributed systems. In: Proceedings of Codes and Ciphers\u2014Cryptography and Coding IV, pp. 225\u2013242 (1995)"},{"key":"62_CR13","doi-asserted-by":"crossref","unstructured":"Koyama, K.: Secure conference key distribution schemes for conspiracy attack. In: Proceedings of Eurocrypt\u201992. LNCS, vol. 658, pp. 449\u2013453 (1993)","DOI":"10.1007\/3-540-47555-9_37"},{"key":"62_CR14","doi-asserted-by":"crossref","unstructured":"Katz, J., Shin, J.S.: Modeling insider attacks on group key-exchange protocols. In: ACM CCS\u201905, pp. 180\u2013189 (2005)","DOI":"10.1145\/1102120.1102146"},{"key":"62_CR15","volume-title":"Modern Cryptography\u2014Theory and Practice. ch13-16","author":"W. Mao","year":"2004","unstructured":"Mao W. (2004). Modern Cryptography\u2014Theory and Practice. ch13-16. Prentice Hall Company, New Jersey"},{"key":"62_CR16","volume-title":"Elliptic Curve Public Key Cryptosystems","author":"A. Menezes","year":"1995","unstructured":"Menezes A. (1995). Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Massachusetts"},{"key":"62_CR17","doi-asserted-by":"crossref","unstructured":"Rabin, T., Ben-Or, M.: Verifiable secret sharing and multi-party protocols with honest majority. In: Proceedings of 26th ACM symposium on Theory of Computing, pp. 73\u201385 (1989)","DOI":"10.1145\/73007.73014"},{"issue":"7","key":"62_CR18","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1016\/0140-3664(94)90100-7","volume":"17","author":"R. Rueppel","year":"1994","unstructured":"Rueppel R. and Oorschot P.V. (1994). IModern key agreement techniques. Comput. Commun. 17(7): 458\u2013465","journal-title":"Comput. Commun."},{"key":"62_CR19","volume-title":"Implementing Elliptic Curve Cryptography","author":"M. Rosing","year":"1999","unstructured":"Rosing M. (1999). Implementing Elliptic Curve Cryptography. Manning Publications Company, Greenwich"},{"key":"62_CR20","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir A. (1979). How to share a secret. Comm. ACM 22: 612\u2013613","journal-title":"Comm. ACM"},{"key":"62_CR21","doi-asserted-by":"crossref","unstructured":"Shimbo, A., Kawamura, S.: Cryptanalysis of several conference key distribution schemes. In: Proceedings of Asiacrypt\u201991. LNCS, vol. 739, pp. 265\u2013276 (1993)","DOI":"10.1007\/3-540-57332-1_22"},{"key":"62_CR22","doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst. 11(8), 769\u2013780 (2000)","DOI":"10.1109\/71.877936"},{"key":"62_CR23","doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: a new approach to group key agreement. In: Proceedings of 18th International Conference on Distributed Computing Systems (1998)","DOI":"10.1109\/ICDCS.1998.679745"},{"key":"62_CR24","doi-asserted-by":"crossref","unstructured":"Tzeng, W.G., Tzeng, Z.J.: Round-Efficient Conference Key Agreement Protocols with Provable Security. In: Proc. Asiacrypt\u201900. LNCS, vol. 1976, pp. 614\u2013627 (2000)","DOI":"10.1007\/3-540-44448-3_47"},{"key":"62_CR25","doi-asserted-by":"crossref","unstructured":"Tingjun, S., Yuanbo, G., Jianfeng, M.: A fault-tolerant and secure multi-conference-key agreement protocol. In: Proceedings of International Conference on Communications, Circuits and Systems, vol. 1, pp. 18\u201321 (2004)","DOI":"10.1109\/ICCCAS.2004.1345930"},{"issue":"4","key":"62_CR26","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1109\/12.995447","volume":"51","author":"W.G. Tzeng","year":"2002","unstructured":"Tzeng W.G. (2002). A secure fault-tolerant conference-key agreement protocol. IEEE Trans. Comput. 51(4): 373\u2013379","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"62_CR27","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1049\/ip-cdt:19971120","volume":"144","author":"T.C. Wu","year":"1997","unstructured":"Wu T.C. (1997). Conference key distribution system with user anonymity based on algebraic approach. IEE Proc. Comput. Digit. Tech. 144(2): 145\u2013148","journal-title":"IEE Proc. Comput. Digit. Tech."},{"issue":"2","key":"62_CR28","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/S0920-5489(03)00002-3","volume":"25","author":"C.C. Yanga","year":"2003","unstructured":"Yanga C.C., Changa T.Y. and Hwang M.S. (2003). A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem. Comput. Stand. Interfaces 25(2): 141\u2013145","journal-title":"Comput. Stand. Interfaces"},{"issue":"3","key":"62_CR29","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/TDSC.2004.31","volume":"1","author":"X. Yi","year":"2004","unstructured":"Yi X. (2004). Identity-based fault-tolerant conference key agreement. IEEE Trans. Depend. Secur. Comput. 1(3): 170\u2013178","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"issue":"4","key":"62_CR30","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1109\/TVT.2003.814227","volume":"52","author":"X. Yi","year":"2003","unstructured":"Yi X., Siew C.K. and Tan C.H. (2003). A secure and efficient conference scheme for mobile communications. IEEE Trans. Veh. Technol. 52(4): 784\u2013793","journal-title":"IEEE Trans. Veh. Technol."},{"key":"62_CR31","doi-asserted-by":"crossref","unstructured":"Zongkai, Y., Haitao, X., Wenqing, C., Yunmeng, T.: An identity-based fault-tolerant conference key distribution scheme. In: Proceedings of 7th International Conference on Parallel and Distributed Computing, Applications and Technologies (2006)","DOI":"10.1109\/PDCAT.2006.31"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-008-0062-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-008-0062-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-008-0062-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T11:01:23Z","timestamp":1559127683000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-008-0062-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,16]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,2]]}},"alternative-id":["62"],"URL":"https:\/\/doi.org\/10.1007\/s10207-008-0062-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,9,16]]}}}