{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T21:10:02Z","timestamp":1750799402994,"version":"3.41.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,8,4]],"date-time":"2017-08-04T00:00:00Z","timestamp":1501804800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,8,4]],"date-time":"2017-08-04T00:00:00Z","timestamp":1501804800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["15H06063"],"award-info":[{"award-number":["15H06063"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s10207-017-0389-6","type":"journal-article","created":{"date-parts":[[2017,8,4]],"date-time":"2017-08-04T07:19:14Z","timestamp":1501831154000},"page":"513-532","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-cast key distribution: scalable, dynamic and provably secure construction"],"prefix":"10.1007","volume":"17","author":[{"given":"Kazuki","family":"Yoneyama","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reo","family":"Yoshida","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuto","family":"Kawahara","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tetsutaro","family":"Kobayashi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hitoshi","family":"Fuji","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tomohide","family":"Yamamoto","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,8,4]]},"reference":[{"key":"389_CR1","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Tripartite authenticated key agreement protocols from pairings. In: IMA International Conference 2003, pp. 332\u2013359 (2003)","DOI":"10.1007\/978-3-540-40974-8_27"},{"key":"389_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: CRYPTO 1993, pp. 232\u2013249 (1993)","DOI":"10.1007\/3-540-48329-2_21"},{"key":"389_CR3","unstructured":"Bergkvist, A., Burnett, D.C., Jennings, C., Narayanan, A., Aboba, B.: WebRTC 1.0: real-time communication between browsers. In: InfoQ (2015)"},{"key":"389_CR4","unstructured":"Berjon, R., Leithead, T., Navara, E.D., O\u2019Connor, E., Pfeiffer, S.: HTML5. In: W3C working draft (2012)"},{"key":"389_CR5","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Provably authenticated group Diffie\u2013Hellman key exchange\u2014the dynamic case. In: Boyd C. (ed.) Advances in Cryptology\u2014ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, 9\u201313 Dec 2001 Proceedings, Lecture Notes in Computer Science, vol. 2248, pp. 290\u2013309. Springer (2001)","DOI":"10.1007\/3-540-45682-1_18"},{"key":"389_CR6","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic group Diffie\u2013Hellman key exchange under standard assumptions. In: Knudsen L.R. (ed.) Advances in Cryptology\u2014EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, 28 April\u20132 May 2002, Proceedings, Lecture Notes in Computer Science, vol. 2332, pp. 321\u2013336. Springer (2002)","DOI":"10.1007\/3-540-46035-7_21"},{"key":"389_CR7","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.: Provably authenticated group Diffie\u2013Hellman key exchange. In: Reiter M.K., Samarati P. (eds.) CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, 6\u20138 Nov 2001, pp. 255\u2013264. ACM (2001)","DOI":"10.1145\/501983.502018"},{"key":"389_CR8","doi-asserted-by":"crossref","unstructured":"Canetti, R., Garay, J.A., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: Proceedings IEEE INFOCOM \u201999, The Conference on Computer Communications, Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, The Future Is Now, New York, NY, USA, 21\u201325 March 1999, pp. 708\u2013716. IEEE (1999)","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"389_CR9","doi-asserted-by":"crossref","unstructured":"Caronni, G., Waldvogel, M., Sun, D., Plattner, B.: Efficient security for large and dynamic multicast groups. In: 7th Workshop on Enabling Technologies (WETICE \u201998), Infrastructure for Collaborative Enterprises, 17\u201319 June 1998, Palo Alto, CAUSA, Proceedings, pp. 376\u2013383. IEEE Computer Society (1998)","DOI":"10.1109\/ENABL.1998.725721"},{"key":"389_CR10","unstructured":"Chesters, J.: Mozilla blocks flash, encourages HTML5 adoption. In: InfoQ (2015)"},{"key":"389_CR11","doi-asserted-by":"crossref","unstructured":"Cremers, C.J.F., Feltz, M.: Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal. In: ESORICS 2012, pp. 734\u2013751 (2012)","DOI":"10.1007\/978-3-642-33167-1_42"},{"key":"389_CR12","doi-asserted-by":"crossref","unstructured":"Dutta, R., Barua, R.: Constant round dynamic group key agreement. In: Zhou J., Lopez v, Deng R.H., Bao F. (eds.) Information Security, 8th International Conference, ISC 2005, Singapore, 20\u201323 Sept 2005, Proceedings, Lecture Notes in Computer Science, vol. 3650, pp. 74\u201388. Springer (2005)","DOI":"10.1007\/11556992_6"},{"key":"389_CR13","doi-asserted-by":"crossref","unstructured":"Fischl, J., Tschofenig, H., Rescorla, E.: Framework for establishing a secure real-time transport protocol (SRTP), security context using datagram transport layer security (DTLS). In: IEFT RFC pp. 5763. (2010)","DOI":"10.17487\/rfc5763"},{"key":"389_CR14","doi-asserted-by":"crossref","unstructured":"Fujioka, A., Manulis, M., Suzuki, K., Ustaoglu, B.: Sufficient condition for ephemeral key-leakage resilient tripartite key exchange. In: ACISP 2012, pp. 15\u201328 (2012)","DOI":"10.1007\/978-3-642-31448-3_2"},{"issue":"3","key":"389_CR15","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s10623-014-9972-2","volume":"76","author":"A Fujioka","year":"2015","unstructured":"Fujioka, A., Suzuki, K., Xagawa, K., Yoneyama, K.: Strongly secure authenticated key exchange from factoring, codes, and lattices. Des. Codes Cryptogr. 76(3), 469\u2013504 (2015)","journal-title":"Des. Codes Cryptogr."},{"key":"389_CR16","doi-asserted-by":"crossref","unstructured":"Gorantla, M.C., Boyd, C., Nieto, J.M.G.: Modeling key compromise impersonation attacks on group key exchange protocols. In: Public Key Cryptography, pp. 105\u2013123 (2009)","DOI":"10.1007\/978-3-642-00468-1_7"},{"key":"389_CR17","doi-asserted-by":"crossref","unstructured":"Joux, A.: A One round protocol for tripartite Diffie\u2013Hellman. In: ANTS 2000, pp. 385\u2013394 (2000)","DOI":"10.1007\/10722028_23"},{"key":"389_CR18","doi-asserted-by":"crossref","unstructured":"Katz, J., Shin, J.S.: Modeling insider attacks on group key-exchange protocols. In: ACM Conference on Computer and Communications Security, pp. 180\u2013189 (2005)","DOI":"10.1145\/1102120.1102146"},{"key":"389_CR19","doi-asserted-by":"crossref","unstructured":"Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: CRYPTO, pp. 110\u2013125 (2003)","DOI":"10.1007\/978-3-540-45146-4_7"},{"key":"389_CR20","doi-asserted-by":"crossref","unstructured":"Kim, H., Lee, S., Lee, D.H.: Constant-round authenticated group key exchange for dynamic groups. In: Lee P.J. (ed.) Advances in Cryptology\u2014ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, 5\u20139 Dec 2004, Proceedings, Lecture Notes in Computer Science, vol. 3329, pp. 245\u2013259. Springer (2004)","DOI":"10.1007\/978-3-540-30539-2_18"},{"key":"389_CR21","doi-asserted-by":"crossref","unstructured":"Kurosawa, K., Furukawa, J.: 2-pass key exchange protocols from cpa-secure KEM. In: Benaloh J. (ed.) Topics in Cryptology\u2014CT-RSA 2014\u2014The Cryptographer\u2019s Track at the RSA Conference 2014, San Francisco, CA, USA, 25\u201328 Feb 2014. Proceedings, Lecture Notes in Computer Science, vol. 8366, pp. 385\u2013401. Springer (2014)","DOI":"10.1007\/978-3-319-04852-9_20"},{"key":"389_CR22","doi-asserted-by":"crossref","unstructured":"LaMacchia, B.A., Lauter, K.E., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo W., Liu J.K., Mu Y. (eds.) Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, 1\u20132 Nov 2007, Proceedings, Lecture Notes in Computer Science, vol. 4784, pp. 1\u201316. Springer (2007)","DOI":"10.1007\/978-3-540-75670-5_1"},{"issue":"7","key":"389_CR23","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1093\/comjnl\/bxp060","volume":"53","author":"I Lin","year":"2010","unstructured":"Lin, I., Tang, S., Wang, C.: Multicast key management without rekeying processes. Comput. J. 53(7), 939\u2013950 (2010)","journal-title":"Comput. J."},{"key":"389_CR24","doi-asserted-by":"crossref","unstructured":"Manulis, M., Suzuki, K., Ustaoglu, B.: Modeling leakage of ephemeral secrets in tripartite\/group key exchange. In: Lee D.H., Hong S. (eds.) Information, Security and Cryptology\u2014ICISC 2009, 12th International Conference, Seoul, Korea, 2\u20134 Dec 2009, Revised Selected Papers, Lecture Notes in Computer Science, vol. 5984, pp. 16\u201333. Springer (2009)","DOI":"10.1007\/978-3-642-14423-3_2"},{"key":"389_CR25","unstructured":"Marshall, J.: Google Chrome Will Begin Blocking Flash Web Ads. In: The Wall Street Journal: (2015)"},{"key":"389_CR26","doi-asserted-by":"crossref","unstructured":"Micciancio, D., Panjwani, S.: Optimal communication complexity of generic multicast key distribution. In: Cachin C., Camenisch J. (eds.) Advances in Cryptology\u2014EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2\u20136 May 2004, Proceedings, Lecture Notes in Computer Science, vol. 3027, pp. 153\u2013170. Springer (2004)","DOI":"10.1007\/978-3-540-24676-3_10"},{"issue":"3","key":"389_CR27","first-page":"3777","volume":"5","author":"N Mittal","year":"2014","unstructured":"Mittal, N., Kumar, V.: An efficient and secure multicast key management scheme based on star topology. Int. J. Comput. Sci. Inf. Technol. 5(3), 3777\u20133783 (2014)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"389_CR28","unstructured":"Rescorla, E.: WebRTC Security architecture, draft-ietf-rtcweb-security-arch-11. In: IETF Draft (2015)"},{"issue":"6","key":"389_CR29","doi-asserted-by":"publisher","first-page":"951","DOI":"10.3844\/jcssp.2012.951.956","volume":"8","author":"K Saravanan","year":"2012","unstructured":"Saravanan, K., Purusothaman, T.: Efficient star topology based multicast key management algorithm. J. Comput. Sci. 8(6), 951\u2013956 (2012)","journal-title":"J. Comput. Sci."},{"key":"389_CR30","doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Casner, S.L., Frederick, R., Jacobson, V.: RTP: A transport protocol for real-time applications. In: IEFT RFC 3550 (2003)","DOI":"10.17487\/rfc3550"},{"issue":"5","key":"389_CR31","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1109\/TSE.2003.1199073","volume":"29","author":"AT Sherman","year":"2003","unstructured":"Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Softw. Eng. 29(5), 444\u2013458 (2003)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"389_CR32","unstructured":"Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. In: Cryptology ePrint Archive: 2004\/332 (2004)"},{"key":"389_CR33","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.ins.2015.01.037","volume":"321","author":"H Sun","year":"2015","unstructured":"Sun, H., He, B., Chen, C., Wu, T., Lin, C., Wang, H.: A provable authenticated group key agreement protocol for mobile environment. Inf. Sci. 321, 224\u2013237 (2015)","journal-title":"Inf. Sci."},{"key":"389_CR34","doi-asserted-by":"crossref","unstructured":"Suzuki, K., Yoneyama, K.: Exposure-resilient one-round tripartite key exchange without random oracles. In: Jr. M.J.J., Locasto M.E., Mohassel P., Safavi-Naini R. (eds.) Applied Cryptography and Network Security\u201411th International Conference, ACNS 2013, Banff, AB, Canada, 25\u201328 June 2013. Proceedings, Lecture Notes in Computer Science, vol. 7954, pp. 458\u2013474. Springer (2013)","DOI":"10.1007\/978-3-642-38980-1_29"},{"issue":"6","key":"389_CR35","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1587\/transfun.E97.A.1345","volume":"97\u2013A","author":"K Suzuki","year":"2014","unstructured":"Suzuki, K., Yoneyama, K.: Exposure-resilient one-round tripartite key exchange without random oracles. IEICE Trans. 97\u2013A(6), 1345\u20131355 (2014)","journal-title":"IEICE Trans."},{"issue":"9","key":"389_CR36","doi-asserted-by":"publisher","first-page":"1614","DOI":"10.1109\/49.790485","volume":"17","author":"M Waldvogel","year":"1999","unstructured":"Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The versakey framework: versatile group key management. IEEE J. Sel. Areas Commun. 17(9), 1614\u20131631 (1999)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"389_CR37","doi-asserted-by":"crossref","unstructured":"Westerlund, M., Wenger, S.: RTP Topologies, draft-ietf-avtcore-rtp-topologies-update-07. In: IETF Draft (2015)","DOI":"10.17487\/RFC7667"},{"key":"389_CR38","unstructured":"Yang, G., Tan, C.H.: Dynamic group key exchange revisited. In: Heng S., Wright R.N., Goi B. (eds.) Cryptology and Network Security\u20149th International Conference, CANS 2010, Kuala Lumpur, Malaysia, 12\u201314 Dec 2010. Proceedings, Lecture Notes in Computer Science, vol. 6467, pp. 261\u2013277. Springer (2010)"},{"issue":"2","key":"389_CR39","first-page":"304","volume":"18","author":"Z Yang","year":"2016","unstructured":"Yang, Z., Zhang, D.: Towards modelling perfect forward secrecy for one-round group key exchange. I. J. Netw. Secur. 18(2), 304\u2013315 (2016)","journal-title":"I. J. Netw. Secur."},{"key":"389_CR40","first-page":"207","volume":"2016","author":"K Yoneyama","year":"2016","unstructured":"Yoneyama, K., Yoshida, R., Kawahara, Y., Kobayashi, T., Fuji, H., Yamamoto, T.: Multi-cast key distribution: scalable, dynamic and provably secure construction. ProvSec 2016, 207\u2013226 (2016)","journal-title":"ProvSec"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-017-0389-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-017-0389-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-017-0389-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T20:29:43Z","timestamp":1750796983000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-017-0389-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,4]]},"references-count":40,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["389"],"URL":"https:\/\/doi.org\/10.1007\/s10207-017-0389-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2017,8,4]]},"assertion":[{"value":"4 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Originality: This paper extends our earlier extended abstract []. The earlier abstract introduces a new security model and construction of multi-cast key distribution (MKD). This submission adds following new results: 1. Though the earlier abstract does not give the security proof of the proposed scheme, we show the security proof formally. 2. In the earlier abstract, the proposed MKD scheme only captures a simple setting (i.e. only one user joins\/leaves the group simultaneously) because of simplicity, and it is just described that an extension to the general setting will be possible. In this paper, we give a concrete protocol of MKD in the general setting (i.e. multiple users can join\/leave the group simultaneously). This manuscript is the authors\u2019 original work and has not been published nor has it been submitted simultaneously elsewhere.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"This paper follows ethical rules of the journal as follows:"}},{"value":"This paper does not receive any funding because the work is done as an academic research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"This paper does not involve any human participants and animals.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human participants and\/or animals"}},{"value":"Any informed consent is not necessary for this paper because it does not involve any human participants and animals.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}