Computer Science ›› 2023, Vol. 50 ›› Issue (11A): 230700075-10.doi: 10.11896/jsjkx.230700075
• Information Security • Previous Articles Next Articles
WANG Zichen1, YUAN Chengsheng1, WANG Yili1, GUO Ping1, FU Zhangjie1,2
CLC Number:
[1]VINOTH R,DEBORAH L J.An efficient key agreement and authentication protocol for secure communication in industrial IoT applications[J].Journal of Ambient Intelligence and Humanized Computing,2023,14(3):1431-1443. [2]DIFFIE W,HELLMAN M E.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654. [3]BLAKE-WILSON S,JOHNSON D,MENEZES A.Key agreement protocols and their security analysis[J].Lecture Notes in Computer Science,1997,1355:30-45. [4]YI X.Identity-based fault-tolerant conference key agreement[J].IEEE Transactions on Dependable and Secure Computing,2004,1(3):170-178. [5]SHEN J,ZHOU T,CHEN X,et al.Anonymous and traceablegroup data sharing in cloud computing[J].IEEE Transactions on Information Forensics and Security,2017,13(4);912-925. [6]ZHANG R,ZHANG L,CHOO K K R,et al.Dynamic authenticated asymmetric group key agreement with sender non-repudiation and privacy for grouporiented applications[J].IEEE Transactions on Dependable and Secure Computing,2021,20(1):492-505. [7]SHEN J,ZHOU T,HE D,et al.Block design-based key agreement for group data sharing in cloud computing[J].IEEE Transactions on Dependable and Secure Computing,2017,16(6):996-1010. [8]LXV W R.An illusion of size[J].The London,Edinburgh,and Dublin Philosophical Magazine and Journal of Science,1946,37(272):643-648. [9]CAMPAGNA M.Sec 4:Elliptic curve qu-vanstone implicit certificate scheme(ecqv)[J].Standards for Efficient Cryptography,Version,2013,4(1):1-28. [10]INGEMARSSON I,TANG D,WONG C.A conference key distribution system[J].IEEE Transactions on Information Theory,1982,28(5):714-720. [11]KIM Y,PERRIG A,TSUDIK G.Tree-based group key agreement-[J].ACM Transactions on Information and System Security(TISSEC),2004,7(1):60-96. [12]BARUA R,DUTTA R,SARKAR P.Extending joux’s protocol to multi party key agreement(extended abstract)[J].Lecture Notes in Computer Science,2003,2003:205-217. [13]BURMESTER M,DESMEDT Y.A secure and efficient conference key distribution system[C]//Advances in Cryptology EUROCRYPT’94:Workshop on the Theory and Application of Cryptographic Techniques Perugia.Italy,Springer,1995:275-286. [14]BRESSON E,CHEVASSUT O,POINTCHEVAL D.Group diffie-hellman key exchange secure against dictionary attacks[C]//Advances in Cryptology ASIACRYPT 2002:8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown.New Zealand,Springer,2002:497- 514. [15]ZHANG R,ZHANG L,CHOO K K R,et al.Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications[J].IEEE Transactions on Dependable and Secure Computing,2021:492-505. [16]SHEN J,ZHOU T,LIU X,et al.A novel latinsquare- based secret sharing for m2m communications[J].IEEE Transactions on Industrial Informatics,2018,14(8):3659-3668. [17]SHEN J,MOH S,CHUNG I.Identity-based key agreement protocol employing a symmetric balanced incomplete block design[J].Journal of Communications and Networks,2012,14(6):682-691. [18]ZHANG J,ZHONG H,CUI J,et al.SMAKA:Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks[J].IEEE Transactions on Information Forensics and Security,2020,16:1810-1824. [19]BRAEKEN A.Pairing free asymmetric group key agreementprotocol[J].Computer Communications,2022,181:267-273. [20]PORAMBAGE P,KUMAR P,SCHMITT C,et al.Certificate-based pairwise key establishment protocol for wireless sensor networks[C]//2013 IEEE 16th International Conference on Computational Science and Engineering.IEEE,2013:667-674. [21]SHEN H.Combinatorial design theory[M].Shanghai:Shanghai Jiaotong University Press,1996:1-63. [22]ELGAMAL T.A public key cryptosystem and a signaturescheme based on discrete logarithms[J].IEEE Transactions on Information Theory,1985,31(4):469-472. [23]STRANGIO M A.On the resilience of key agreement protocols to key compromise impersonation[C]//EuroPKI.Springer,2006:233-247. [24]XIE M,WANG L.One-round identity-based key exchange with perfect forward security[J].Information Processing Letters,2012,112(14/15):587-591. |
[1] | LI Xiaohuan, CHEN Bitao, KANG Jiawen, YE Jin. Coalition Game-assisted Joint Resource Optimization for Digital Twin-assisted Edge Intelligence [J]. Computer Science, 2023, 50(2): 42-49. |
[2] | Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54. |
[3] | ZHANG Xiao-mei, CAO Ying, LOU Ping, JIANG Xue-mei, YAN Jun-wei, LI Da. Lossless Data Compression Method Based on Edge Computing [J]. Computer Science, 2022, 49(11A): 210500195-6. |
[4] | LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54. |
[5] | WANG Wei-hong, CHEN Zhen-yu. Intelligent Manufacturing Security Model Based on Improved Blockchain [J]. Computer Science, 2021, 48(2): 295-302. |
[6] | YANG Wei, WANG Qin, WAN Ya-dong and HE Jie. Design of Secure Multi-hop Time Synchronization Protocol for IEEE802.15.4e [J]. Computer Science, 2017, 44(3): 175-181. |
[7] | QIAN Qi-feng CHENG Chun-ling. Pairing-free Certificateless Group Key Agreement Protocol for Wireless Sensor Network [J]. Computer Science, 2015, 42(7): 186-190. |
[8] | HE Wen-cai,DU Min,LIU Pei-he,CHEN Zhi-wei and ZHENG Zhao. Wireless AD-hoc Network Group Key Management Scheme Based on Paillier Homomorphic [J]. Computer Science, 2013, 40(10): 114-118. |
[9] | ZHAO Xiu-feng,XU Qiu-liang, LIU wei. Asymmetric Group Key Agreement with Traitor Traceability [J]. Computer Science, 2011, 38(9): 41-44. |
[10] | . [J]. Computer Science, 2009, 36(1): 60-64. |
[11] | . [J]. Computer Science, 2008, 35(9): 9-12. |
[12] | . [J]. Computer Science, 2008, 35(10): 61-64. |
[13] | CUI Guo-Hua ZHENG Ming-Hui SU Li (School of Computer Science, Huazhong University of Science & Technology, Wuhan 430074). [J]. Computer Science, 2008, 35(1): 77-79. |
|