Citation: | ZHANG Qikun, ZHANG Quanxin, MA Zhongmei, et al., “An Authenticated Asymmetric Group Key Agreement for Imbalanced Mobile Networks,” Chinese Journal of Electronics, vol. 23, no. 4, pp. 827-835, 2014, |
Wan Changsheng, Hu Aiqun and Zhang Juan, An elliptic curve based handoff authentication protocol for WLAN, Chinese Journal of Electronics, Vol.20, No.1, pp.165-169, 2011
|
Xu Chunxiang and Zhou Junhui, ECC based dynamic multiparty key agreement, Chinese Journal of Electronics, Vol.18, No.2, pp.355-360, 2009.
|
E. Bresson, O. Chevassut, A. Essiari and D. Pointcheval, Mutual authentication and group key agreement for low-power mobile devices, Computer Communications, Vol.27, No.17, pp.1730-1737, 2004.
|
E. Bresson, O. Chevassut, A. Essiari and D. Pointcheval, Mutual authentication and group key agreement for low-power mobile devices, Comput Commun., Vol.27, No.7, pp.1730-1737, 2004.
|
J. Nam, S. Kim and D. Won, A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices, IEEE Commun Lett. 2005, Vol.9, pp.429-431, 2005.
|
J. Nam, J. Lee, S. Kim and D. Won, DDH-based group key agreement in a mobile environment. J. Syst. Softw., Vol.78, No.1, pp.73-83, 2005.
|
J. Katz and M. Yung, Scalable protocols for authenticated group key exchange, Proceedings of Advances in Cryptology-Crypto'03, pp.110-125, 2003.
|
Y.M. Tseng, A resource-constrained group key agreement protocol for imbalanced wireless networks, Comput. Secur., Vol.26, No.4, pp.331-337, 2007.
|
C.C. Lee, T.H. Lim and C.S. Tsai, A new authenticated group key agreement in a mobile environment, Ann. Telecommun., Vol.64, No.11-12, pp.735-744, 2009.
|
Q.F. Cheng, C.G. Ma and F.S. Wei, Analysis and improvement of a new authenticated group key agreement in a mobile environment, Ann. Telecommun., Vol.66, pp.331-337, 2011.
|
J.L. Tsai, A novel authenticated group key agreement protocol for mobile environment, Ann. Telecommun., Vol.66, No.11-12, pp.663-669, 2011.
|
J. Zhao and D. Gu, Provably secure three-party password-based authenticated key exchange protocol, Inf. Sci., Vol.184, pp.310-323, 2012.
|
Z. Cheng, M. Nistazakis, R. Comley and L. Vasiu, On the indistinguishability-based security model of key agreement protocolssimple cases, Cryptology ePrint Achieve, 2005.
|
M. Manulis, K. Suzuki and B. Ustaoglu, Modeling leakage of ephemeral secrets in tripartite/group key exchange, Proceeding of the 12th international conference on Information security and cryptology (ICISC'09), pp.16-33, 2009.
|
F. Zhang, R. Safavi-Naini and W. Susilo, An efficient signature scheme from bilinear pairings and its applications, Proceeding of the Public Key Cryptography (PKC'04), pp.277-290, 2004.
|
S. Islam and G. Biswas, A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks, Annals of Telecommunications, Vol.67, No.11-12, pp.547-558, 2012.
|
Haiyan Sun, On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks, available at https://eprint.iacr.org/2013/030.pdf, 2013-9.
|
Qingfeng Cheng, Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks, available at https://eprint.iacr. org/2013/006.pdf, 2013-9.
|
Zhang Qikun, Li Yuanzhang, Song Danjie and Tan Yuan, Alliance-authentication protocol in clouds computing environment, China Communications, Vol.7, pp.42-54, 2012.
|
K.Y. Choi, J.Y. Hwang and D.H. Lee, ID-based authenticated key agreement for low-power mobile devices, ACISP 05, Brisbane, Australia, pp.494-505, 2005.
|
J.T. Chung, C.M. Li and T. Hwang, All-in-one group-oriented cryptosystem based on bilinear pairing, Inf. Sci., Vol.177, No.24, pp.5651-5663, 2007.
|
Z. Shao, Self-certified signature scheme from pairings, J. Syst. Softw., Vol.80, No.3, pp.388-395, 2007.
|
Q. Wang and Z. Cao, Identity based proxy multi-signature, J. Syst. Softw., Vol.80, No.7, pp.1023-1029, 2007.
|
Chik How Tan and Joseph Chee Ming Teo, Energy-efficient ID-based group key agreement protocols for wireless networks, 20th International Parallel and Distributed Processing Symposium, 2006-IPDPS, DC, USA, pp.25-29, 2006.
|
Xingwen Zhao, Fangguo Zhang and Haibo Tian, Dynamic asymmetric group key agreement for ad hoc networks, Ad Hoc Networks, Vol.9, pp.928-939, 2011.
|
Yuh-min Tseng, A secure authenticated group key agreement protocol for resource-limited mobile devices, The Computer Journal, Vol.50, No.1, pp.41-52, 2007.
|