共 21 条
- [1] Aneksrup T., Hiranvanichakorn P., Efficient group key agreement on tree-based braid groups, Computer and Information Science, 4, 1, pp. 14-27, (2011)
- [2] Artin E., Theory of braids, Annals of Mathematics, 48, 1, pp. 101-126, (1947)
- [3] Bresson E., Chevassut O., Pointcheval D., Provably authenticated group diffie-hellman key exchange - The dynamic case, Proceedings ofAdvances on Cryptology (Asiacrypt'01), pp. 290-309, (2001)
- [4] Burrows M., Abadi M., Needham R., A logic of authentication, ACM Transactions on Computer Systems, 8, 1, pp. 18-36, (1990)
- [5] Chan K.C., Chan S.H., Key management approaches to offer data confidentiality for secure mul-ticasts, IEEE Network, 17, 5, pp. 30-39, (2003)
- [6] Chaturvedi A., Lal S., An authenticated key agreement protocol using conjugacy problem in braid groups, International Journal of Network Security, 6, 2, pp. 181-184, (2008)
- [7] Dutta R., Barua R., Provably secure constant round contributory group key agreement in dynamic setting, IEEE Transactions on Information Theory, 54, 5, pp. 2007-2025, (2008)
- [8] Hwang J.Y., Lee S.M., Lee D.H., Scalable key exchange transformation: From two party to group, Electronic Letters, 40, 12, pp. 728-729, (2004)
- [9] Kim Y., Perrig A., Tsudik G., Tree-based group key agreement, ACM Transactions on Information and System Security, 7, 1, pp. 60-96, (2004)
- [10] Ko K.H., Lee J.W., Thomas T., Towards generating secure keys for braid cryptography, Designs, Codes and Cryptography, 45, 3, pp. 317-333, (2007)