Citation: | ZHANG Qikun, WANG Bingli, ZHANG Xiaosong, et al., “Blockchain-Based Dynamic Group Key Agreement Protocol for Ad Hoc Network,” Chinese Journal of Electronics, vol. 29, no. 3, pp. 447-454, 2020, doi: 10.1049/cje.2020.02.020 |
W. Diffie and M. Hellman, “New directions in cryptography”, IEEE transactions on Information Theory, Vol.22, No.6, pp.644-654, 1976.
|
Q. Zhang, Y. Li, Y Gan, et al., “Group key agreement protocol based on privacy protection and attribute authentication”, IEEE Access, Vol.7, pp.87085-87096, 2019.
|
E. Makri and E. Konstantinou, “Constant round group key agreement protocols: A comparative study”, Computers and Security, Vol.30, No.8, pp.643-678, 2011.
|
Q. Zhang, J. Yuan, G. Guo, et al., “An authentication key establish protocol for WSNs based on combined key”, Wireless Personal Communications, Vol.99, No.1, pp.95-110, 2018.
|
J. Teng and C. Wu, “A provable authenticated certificateless group key agreement with constant rounds”, Journal of Communications and Networks, Vol.14, No.1, pp.104-110, 2012.
|
S. Islam and A. Singh, “Provably secure one-round certificateless authenticated group key agreement protocol for secure communications”, Wireless Personal Communications, Vol.85, No.3, pp.879-898, 2015.
|
Q. Zhang, Q. Zhang, Z. Ma, et al., “An authenticated asymmetric group key agreement for imbalanced mobile networks”, Chinese Journal of Electronics, Vol.23, No.4, pp.827-835, 2014.
|
Q. Zhang, Y. Li, Z. Li, et al., “Access control based on ciphertext attribute authentication and threshold policy for the internet of things”, Sensors, Vol.19, No.23, Article ID 5237, 12 pages, 2019.
|
J. Zheng, X. Zhang, Q. Zhang, et al., “Multi-domain lightweight asymmetric group key agreement”, Chinese Journal of Electronics, Vol.27, No.5, pp.1085-1091, 2018.
|
O. Ermis, S. Bahtiyar, E. Anarim, et al., “A secure and efficient group key agreement approach for mobile ad hoc networks”, Ad Hoc Networks, Vol.67, pp.24-39, 2017.
|
S. Islam, M. Obaidat, P. Vijayakumar, et al., ”A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs”, Future Generation Computer Systems, Vol.84, pp.216-227, 2018.
|
M. Wang and Z Yan, “Privacy-preserving authentication and key agreement protocols for D2D group communications”, IEEE Transactions on Industrial Informatics, Vol.14, No.8, pp.3637-3647, 2018.
|
Y. Tan,J. Zheng, Q. Zhang, et al., “A Specific-targeting asymmetric group key agreement for cloud computing”, Chinese Journal of Electronics, Vol.27, No.4, pp.866-872, 2018.
|
J. Zheng, Y. Tan, Q. Zhang, et al., “Cross-cluster asymmetric group key agreement for wireless sensor networks”, Science China Information Sciences, Vol.61, No.4, Article ID 048103, 3 pages, 2018.
|
Q. Zhang, Y. Gan, Q. Zhang, et al., “A dynamic and cross-domain authentication asymmetric group key agreement in telemedicine application”, IEEE Access, Vol.6, pp.24064-24074, 2018.
|
P. Vijayakumar, R. Naresh, L. Jegatha Deborah, et al., “An efficient group key agreement protocol for secure P2P communication”, Security and Communication Networks, Vol.9, No.17, pp.3952-3965, 2016.
|
Q. Zhang, Y. Li, Q. Zhang, et al., “A self-certified crosscluster asymmetric group key agreement for wireless sensor networks”, Chinese Journal of Electronics, Vol.28, No.2, pp.280-287, 2019.
|