Continuous Group Key Agreement with Flexible Authorization and Its Applications
Abstract
References
Index Terms
- Continuous Group Key Agreement with Flexible Authorization and Its Applications
Recommendations
How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecuritySecure group messaging (SGM) protocols allow large groups of users to communicate in a secure and asynchronous manner. In recent years, continuous group key agreements (CGKAs) have provided a powerful abstraction to reason on the security properties we ...
Efficient group Diffie-Hellman key agreement protocols
Display Omitted Authenticated group Diffie-Hellman (GDH) key agreement protocols are proposed.GDH key agreement protocols are based on the secret sharing.Our proposed solution is efficient, robust and secure. In a group Diffie-Hellman (GDH) key ...
Enhancement on strongly secure group key agreement
In 2011, Zhao et al. presented a new security model of group key agreement GKA by considering ephemeral secret leakage ESL attacks. Meanwhile, they proposed a strongly secure GKA protocol under the new model. In this paper, two security weaknesses on ...
Comments
Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 97Total Downloads
- Downloads (Last 12 months)29
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in