{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:25:36Z","timestamp":1738819536072,"version":"3.37.0"},"reference-count":13,"publisher":"Academy Publisher","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.6.10.1422-1429","type":"journal-article","created":{"date-parts":[[2011,9,30]],"date-time":"2011-09-30T16:15:06Z","timestamp":1317399306000},"source":"Crossref","is-referenced-by-count":1,"title":["A Scalable ID-based Constant-round AGKE Protocol with Logarithmic Computation Complexity"],"prefix":"10.4304","volume":"6","author":[{"given":"Xiufeng","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Qiuliang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"He","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2011,10,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref2","first-page":"275","article-title":"A secure and efficient conference key distribution system.","volume-title":"Proc. Eurocrypt \u201994, LNCS","volume":"950","author":"Burmester","year":"1995"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984337"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/10722028_23"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_12"},{"key":"ref6","first-page":"47","article-title":"Identity-Based Cryptosystems and Signature Schemes.","volume-title":"Proc. Crypto\u201984.","author":"Shamir","year":"1985"},{"key":"ref7","first-page":"213","article-title":"Identity-Based Encryption from the Weil Pairing.","volume-title":"Proc. Crypto 2001, LNCS 2139","author":"Boneh","year":"2001"},{"key":"ref8","first-page":"215","article-title":"Identity based authenticated group key agreement protocol.","volume-title":"Proc. Indocrypt2002, LNCS","volume":"2551","author":"Reddy","year":"2002"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2004.04.008"},{"issue":"Issue 1","key":"ref10","first-page":"7","article-title":"J.F. MA. Identity-based Constant Round Group Key Exchange Protocol via Secret-Share.","volume":"7","year":"2008","journal-title":"WSEAS TRANSACTIONS on SYSTEMS."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1145\/501983.502018","article-title":"Provably Authenticated Group Diffie-Hellman Key Exchange.","volume-title":"Proc. of the 8th ACM conference on Computer and Communications Secu-rity (CCS'01)","author":"Bresson","year":"2001"},{"key":"ref12","first-page":"290","volume-title":"Proc. of Asiacrypt \u201902, LNCS","volume":"2248","author":"Bresson","year":"2001"},{"key":"ref13","first-page":"416","article-title":"Aggregate and verifiably encrypted signatures from bilinear maps.","volume-title":"Proc. of Eurocrypt'03, LNCS","volume":"2656","author":"Boneh","year":"2003"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:11:28Z","timestamp":1738775488000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,1]]},"references-count":13,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2011,10,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.6.10.1422-1429","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2011,10,1]]}}}