{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:38:35Z","timestamp":1729654715733,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/pst.2011.5971971","type":"proceedings-article","created":{"date-parts":[[2011,8,15]],"date-time":"2011-08-15T16:33:42Z","timestamp":1313426022000},"page":"102-111","source":"Crossref","is-referenced-by-count":1,"title":["Forward secure identity-based key agreement for dynamic groups"],"prefix":"10.1109","author":[{"given":"N.","family":"Mailloux","sequence":"first","affiliation":[]},{"given":"A.","family":"Miri","sequence":"additional","affiliation":[]},{"given":"M.","family":"Nevins","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e91-a.7.1828"},{"article-title":"Key Establishment: Proofs and Refutations","year":"2006","author":"choo","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/978-3-642-00862-7_21","article-title":"Practical short signature batch verifi-cation","author":"ferrara","year":"2009","journal-title":"Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology"},{"key":"ref13","first-page":"310","article-title":"Efficient Identity Based Signature Schemes Based on Pairings","author":"hess","year":"2003","journal-title":"SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","article-title":"Scalable Protocols for Authenticated Group Key Exchange","author":"katz","year":"2003","journal-title":"Advances in Cryptology - CRYPTO 2003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11582267_11"},{"key":"ref16","first-page":"357","article-title":"An Efficient Tree-Based Group Key Agreement Using Bilinear Map","author":"lee","year":"2004","journal-title":"ACNS 2003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2004.10.024"},{"key":"ref18","article-title":"ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings","author":"zhang","year":"2002","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1142\/9789812791146_0013"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/3-540-36288-6_12","article-title":"Round-Optimal Contributory Conference Key Agreement","author":"boyd","year":"2003","journal-title":"Public Key Cryptography ? PKC 2003"},{"key":"ref6","first-page":"18","article-title":"An Identity-Based Signature from Gap Diffie-Hellman Groups","author":"cha","year":"2003","journal-title":"Public Key Cryptography - PKC 2003"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1145\/501983.502018","article-title":"Provably Authenticated Group Diffie-Hellman Key Exchange","author":"bresson","year":"2001","journal-title":"CCS&#x2019;01 Proceedings of the 8th ACM Conference on Computer and Communications Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74477-1_89"},{"key":"ref7","first-page":"119","article-title":"A New ID-based Signature with Batch Verification","volume":"8","author":"cheon","year":"2005","journal-title":"Trends in Mathematics"},{"key":"ref2","first-page":"219","article-title":"Identity-based Encryption from the Weil Pairing","author":"boneh","year":"2001","journal-title":"Advances in Cryptology-Crypto 2001"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/288090.288097","article-title":"Authenticated Group Key Agreement and Friends","author":"ateniese","year":"1998","journal-title":"CCS &#x2018;98 Proceedings of the 5th ACM conference on Computer and Communications Security"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1007\/978-3-540-24632-9_10","article-title":"Efficient ID-based Group Key Agreement with Bilinear Maps","author":"choi","year":"2004","journal-title":"Public Key Cryptography - PKC 2004"}],"event":{"name":"2011 Ninth Annual International Conference on Privacy, Security and Trust","start":{"date-parts":[[2011,7,19]]},"location":"Montreal, QC","end":{"date-parts":[[2011,7,21]]}},"container-title":["2011 Ninth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5961997\/5971950\/05971971.pdf?arnumber=5971971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T00:44:51Z","timestamp":1497919491000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5971971\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/pst.2011.5971971","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}