{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:16:15Z","timestamp":1756167375452,"version":"3.44.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/ants.2012.6524229","type":"proceedings-article","created":{"date-parts":[[2013,6,13]],"date-time":"2013-06-13T16:55:49Z","timestamp":1371142549000},"page":"61-66","source":"Crossref","is-referenced-by-count":0,"title":["Group key establishment (GKE): Two\/three party key exchange to GKE"],"prefix":"10.1109","author":[{"given":"S. Sree","family":"Vivek","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India"}]},{"given":"S. Sharmila","family":"Deva Selvi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India"}]},{"given":"Deepanshu","family":"Shukla","sequence":"additional","affiliation":[{"name":"Institute of Technology Banaras Hindu University, Varanasi, India"}]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India"}]}],"member":"263","reference":[{"key":"19","first-page":"255","article-title":"Provably authenticated group diffie-hellman key exchange","author":"bresson","year":"2001","journal-title":"Proceedings of 8th Annual ACM Conference on Computer and Communications Security"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75651-4_20"},{"key":"18","first-page":"104","article-title":"Scalable authenticated tree based group key exchange for ad-hoc groups","volume":"4886","author":"desmedt","year":"2007","journal-title":"Financial Cryptography and Data Security 11th International Conference FC 2007 Proceedings in Springer Lecture Notes in Computer Science"},{"key":"15","first-page":"110","article-title":"Scalable protocols for authenticated group key exchange","volume":"2729","author":"katz","year":"2003","journal-title":"Advances in Cryptology CRYPTO 2003 23rd Annual International Cryptology Conference Proceedings in Springer Lecture Notes in Computer Science"},{"key":"16","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1145\/1102120.1102146","article-title":"Modeling insider attacks on group keyexchange protocols","author":"katz","year":"2005","journal-title":"Proceedings of the 12th ACM conference on Computer and communications security"},{"journal-title":"An Improved ID-based Authenticated Group Key Agreement Scheme","year":"2003","author":"du","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85230-8_5"},{"key":"11","first-page":"92","article-title":"Ratna dutta and palash sarkar.provably secure authenticated tree based group key agreement protocol using pairing","volume":"3269","author":"barua","year":"2004","journal-title":"Information and Communications Security ICICS 2004 6th International Conference Proceedings in Springer Lecture Notes in Computer Science"},{"key":"12","first-page":"130","article-title":"Efficient id-based group key agreement with bilinear maps","volume":"2947","author":"choi","year":"2004","journal-title":"Public Key Cryptography PKC 2004 7th International Workshop on Theory and Practice in Public Key Cryptography Proceedings in Springer Lecture Notes in Computer Science"},{"key":"21","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/3-540-46035-7_22","article-title":"Universally composable notions of key exchange and secure channels","volume":"2332","author":"canetti","year":"2002","journal-title":"Advances in Cryptology-EUROCRYPT 2002 International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"20","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/3-540-45708-9_10","article-title":"Security analysis of ike's signature-based key-exchange protocol in","volume":"2442","author":"canetti","year":"2002","journal-title":"Advances in Cryptology-CRYPTO 2002 22nd Annual International Cryptology Conference"},{"key":"22","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","article-title":"Key-exchange protocols and their use for building secure channels","volume":"2045","author":"canetti","year":"2001","journal-title":"Advances in Cryptology-EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques"},{"year":"0","key":"23"},{"key":"24","first-page":"419","author":"bellare","year":"1998","journal-title":"A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1996.492418"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_21"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"28","first-page":"44","article-title":"Systematic design of two-party authentication protocols","volume":"576","author":"bird","year":"1991","journal-title":"Advances in Cryptology-CRYPTO '93 13th Annual International Cryptology Conference"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"3","first-page":"69","article-title":"Constant-round password-based authenticated key exchange protocol for dynamic groups","volume":"5143","author":"wu","year":"2007","journal-title":"Financial Cryptography and Data Security 12th International Conference FC 2008 Revised Selected Papers Proceedings in Springer Lecture Notes in Computer Science"},{"key":"2","first-page":"499","article-title":"Maria isabel gonzalez vasco and rainer steinwandt: Password authenticated key establishment: From 2-party to group","volume":"4392","author":"abdalla","year":"2007","journal-title":"Theory of Cryptography 4th Theory of Cryptography Conference TCC 2007 Proceedings in Springer Lecture Notes in Computer Science"},{"key":"10","first-page":"205","article-title":"Ratna Dutta and Palash Sarkar.: Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract","volume":"2904","author":"barua","year":"2003","journal-title":"Progress in Cryptology INDOCRYPT 2003 4th International Conference on Cryptology in India Proceedings in Springer Lecture Notes in Computer Science"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1049\/el:20040449"},{"key":"30","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/10722028_23","volume":"1838","author":"joux","year":"2000","journal-title":"Algorithmic Number Theory 4th International Symposium ANTS-IV"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2005.01.003"},{"key":"6","first-page":"119130","article-title":"Efficient and secure conference key distribution","volume":"1189","author":"burmester","year":"1996","journal-title":"Security Protocols 1996 Proceedings in Springer Lecture Notes in Computer Science"},{"key":"32","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/3-540-36288-6_12","article-title":"Round-optimal contributory conference key agreement","volume":"2567","author":"boyd","year":"2003","journal-title":"Public Key Cryptography-PKC 2003 6th International Workshop on Theory and Practice in Public Key Cryptography"},{"key":"5","first-page":"275286","article-title":"A secure and efficient conference key distribution system (extended abstract","volume":"950","author":"burmester","year":"1994","journal-title":"Proc Eurocrypt 94 Lecture Notes in Computer Science"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319721"},{"key":"4","first-page":"65","article-title":"Pierre-alain fouque and david pointcheval.: Password-based authenticated key exchange in the three-party setting","volume":"3386","author":"abdalla","year":"2005","journal-title":"Public Key Cryptography PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography Proceedings in Springer Lecture Notes in Computer Science"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056542"},{"key":"8","first-page":"36","article-title":"Authenticated multi-party key agreement. In: Advances in Cryptology-ASIACRYPT 1996","volume":"1163","author":"just","year":"1996","journal-title":"International Conference on the Theory and Applications of Cryptology and Information Security"}],"event":{"name":"2012 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","start":{"date-parts":[[2012,12,16]]},"location":"Bangalore, India","end":{"date-parts":[[2012,12,19]]}},"container-title":["2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6521480\/6524214\/06524229.pdf?arnumber=6524229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T20:20:24Z","timestamp":1756153224000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6524229\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/ants.2012.6524229","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}