We propose an identity-based authenticated conference key agreement protocol for multi-party. Our protocol is a protocol meeting a lower bound of only one round for multi-party contributory key agreement protocol. The security attributes of our protocol are explained using the security model, and the computational overheads are analyzed as well. © Springer-Verlag 2004.
CITATION STYLE
Kim, J. S., Kim, H. C., Ha, K. J., & Yoo, K. Y. (2004). One round identity-based authenticated conference key agreement protocol. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3262, 407–416. https://doi.org/10.1007/978-3-540-30197-4_41
Mendeley helps you to discover research relevant for your work.