{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T19:40:12Z","timestamp":1650742812759},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,12,3]],"date-time":"2014-12-03T00:00:00Z","timestamp":1417564800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1007\/s11432-014-5176-7","type":"journal-article","created":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T20:44:44Z","timestamp":1417553084000},"page":"1-13","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On \u03c4-time secure key agreement"],"prefix":"10.1007","volume":"58","author":[{"given":"ShaoQuan","family":"Jiang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,3]]},"reference":[{"key":"5176_CR1","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M E. New directions in cryptography. IEEE Trans Inform Theory, 1976, 22: 644\u2013654","journal-title":"IEEE Trans Inform Theory"},{"key":"5176_CR2","series-title":"LNCS","first-page":"232","volume-title":"Proceedings of Advances in Cryptology-CRYPTO 1993, 13th Annual International Cryptology Conference","author":"M Bellare","year":"1994","unstructured":"Bellare M, Rogaway P. Entity authentication and key distribution. In: Stinson D R, ed. Proceedings of Advances in Cryptology-CRYPTO 1993, 13th Annual International Cryptology Conference, LNCS, Vol 773. Berlin: Springer-Verlag, 1994. 232\u2013249"},{"key":"5176_CR3","first-page":"57","volume-title":"Proceedings of the 27th Annual ACM Symposium on Theory of Computing, Las Vegas","author":"M Bellare","year":"1995","unstructured":"Bellare M, Rogaway P. Provably-secure session key distribution: the three party case. In: Leighton F T, Borodin A, eds. Proceedings of the 27th Annual ACM Symposium on Theory of Computing, Las Vegas, 1995. 57\u201366"},{"key":"5176_CR4","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1145\/1368310.1368349","volume-title":"Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo","author":"R Safavi-Naini","year":"2008","unstructured":"Safavi-Naini R, Jiang S Q. Non-interactive conference key distribution and its applications. In: Abe M, Gligor V D, eds. Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, 2008. 271\u2013282"},{"key":"5176_CR5","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0166-218X(88)90068-6","volume":"21","author":"C J Mitchell","year":"1988","unstructured":"Mitchell C J, Piper F C. Key storage in secure network. Discrete Appl Math, 1988, 21: 215\u2013228","journal-title":"Discrete Appl Math"},{"key":"5176_CR6","volume-title":"Elements of Information Theory","author":"T M Cover","year":"2006","unstructured":"Cover T M, Thomas J A. Elements of Information Theory. New Jersey: John Wiley & Sons, Inc., 2006"},{"key":"5176_CR7","series-title":"LNCS","first-page":"335","volume-title":"Proceedings of Advances in Cryptology-EUROCRYPT 1984","author":"R Blom","year":"1985","unstructured":"Blom R. An optimal class of symmetric key generation systems. In: Beth T, Cot N, Ingemarsson I, eds. Proceedings of Advances in Cryptology-EUROCRYPT 1984, LNCS 209. Berlin: Springer-Verlag, 1985. 335\u2013338"},{"key":"5176_CR8","series-title":"LNCS","first-page":"185","volume-title":"Proceedings of Advances in Cryptology-CRYPTO 1987","author":"T Matsumoto","year":"1988","unstructured":"Matsumoto T, Imai M. On the key predistribution system: a practical solution to the key distribution problem. In: Pomerance C, ed. Proceedings of Advances in Cryptology-CRYPTO 1987, LNCS, Vol 239. Berlin: Springer-Verlag, 1988. 185\u2013193"},{"key":"5176_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1006\/inco.1998.2717","volume":"146","author":"C Blundo","year":"1998","unstructured":"Blundo C, De Santis A, Herzberg A, et al. Perfectly secure key distribution for dynamic conferences. Inf Comput, 1998, 146: 1\u201323","journal-title":"Inf Comput"},{"key":"5176_CR10","series-title":"LNCS","first-page":"480","volume-title":"Proceedings of Advances in Cryptology-CRYPTO 1993, 13th Annual International Cryptology Conference","author":"A Fiat","year":"1994","unstructured":"Fiat A, Naor M. Broadcast encryption. In: Stinson D R, ed. Proceedings of Advances in Cryptology-CRYPTO 1993, 13th Annual International Cryptology Conference, LNCS, Vol 773. Berlin: Springer-Verlag, 1994. 480\u2013491"},{"key":"5176_CR11","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1007\/s11432-010-0005-0","volume":"53","author":"D Y Pei","year":"2010","unstructured":"Pei D Y, Dong J W, Rong C M. A novel key pre-distribution scheme for wireless distributed sensor networks. Sci China Inf Sci, 2010, 53: 288\u2013298","journal-title":"Sci China Inf Sci"},{"key":"5176_CR12","series-title":"LNCS","first-page":"444","volume-title":"Proceedings of Advances in Cryptology-CRYPTO 1993, 13th Annual International Cryptology Conference","author":"A Beimel","year":"1994","unstructured":"Beimel A, Chor B. Communication in key distribution schemes. In: Stinson D R, ed. Proceedings of Advances in Cryptology-CRYPTO 1993, 13th Annual International Cryptology Conference, LNCS, Vol 773. Berlin: Springer-Verlag, 1994. 444\u2013455"},{"key":"5176_CR13","series-title":"LNCS","first-page":"471","volume-title":"Proceedings of Advances in Cryptology-CRYPTO 1992, 12th Annual International Cryptology Conference","author":"C Blundo","year":"1993","unstructured":"Blundo C, De Santis A, Herzberg A, et al. Perfectly secure key distribution for dynamic conferences. In: Brickell E F, ed. Proceedings of Advances in Cryptology-CRYPTO 1992, 12th Annual International Cryptology Conference, LNCS, Vol 740. Berlin: Springer-Verlag, 1993. 471\u2013486"},{"key":"5176_CR14","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/S0304-3975(98)80007-8","volume":"200","author":"C Blundo","year":"1998","unstructured":"Blundo C, Mattos L A F, Stinson D R. Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution. Theor Comp Sci, 1998, 200: 313\u2013334","journal-title":"Theor Comp Sci"},{"key":"5176_CR15","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1093\/comjnl\/42.1.51","volume":"42","author":"C Blundo","year":"1999","unstructured":"Blundo C, D\u2019Arco P, Gaggia A G. A \u03c4-restricted key agreement scheme. Comput J, 1999, 42: 51\u201361","journal-title":"Comput J"},{"key":"5176_CR16","series-title":"LNCS","first-page":"535","volume-title":"Proceedings of Advances in Cryptology-EUROCRYPT 1991","author":"S Berkovits","year":"1991","unstructured":"Berkovits S. How to broadcast a secret. In: Davies D W, ed. Proceedings of Advances in Cryptology-EUROCRYPT 1991, LNCS, Vol 547. Berlin: Springer-Verlag, 1991. 535\u2013541"},{"key":"5176_CR17","doi-asserted-by":"crossref","first-page":"45","DOI":"10.3233\/JCS-2006-14102","volume":"14","author":"S Cimato","year":"2006","unstructured":"Cimato S, Cresti A, D\u2019Arco P. A unified model for unconditionally secure key distribution. J Comput Secur, 2006, 14: 45\u201364","journal-title":"J Comput Secur"},{"key":"5176_CR18","series-title":"LNCS","first-page":"287","volume-title":"Proceedings of Advances in Cryptology-EUROCRYPT 1994","author":"C Blundo","year":"1995","unstructured":"Blundo C, Cresti A. Space requirements for broadcast encryption. In: De Santis A, ed. Proceedings of Advances in Cryptology-EUROCRYPT 1994, LNCS, Vol 950. Berlin: Springer-Verlag, 1995. 287\u2013298"},{"key":"5176_CR19","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1023\/A:1008268610932","volume":"12","author":"D R Stinson","year":"1997","unstructured":"Stinson D R. On some methods for unconditionally secure key distribution and broadcast encryption. Design Code Cryptography, 1997, 12: 215\u2013243","journal-title":"Design Code Cryptography"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5176-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-014-5176-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5176-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T19:13:49Z","timestamp":1650741229000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-014-5176-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,3]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["5176"],"URL":"https:\/\/doi.org\/10.1007\/s11432-014-5176-7","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,3]]}}}