참고문헌
- A. Shamir, 'Identity-based cryptosystems and signature schemes,' Proc. of Crypto 84, LNCS 196, pp. 47-53, 1984.
- M. Burmester and Y. Desmedt. 'A secure and efficient conference key distribution system,' Proc. of EUROCRYPT'94, LNCS 950, pp. 275-286, May 1994
- D. Pointcheval and J. Stern, 'Security arguments for digital signatures and blind signatures,' Journal of Cryptology, vol. 13, no. 3, pp. 361-396, Dec. 2000 https://doi.org/10.1007/s001450010003
- E. Bresson, O. Chevassut, D.' Pointcheval, and J. Quisquater, 'Provably authenticated group Diffie-Hellman key exchange,' 8th ACM. conference on Computer and Communications Security (CCS'01), pp. 255-264, Dec. 2001 https://doi.org/10.1145/501983.502018
- D. Boneh and M. Franklin, 'Identitybased encryption from the Wei! pairing,' Proc. of Crypto'01, LNCS 2139, pp. 213-229, 2001
- J. Katz and M. Yung, 'Scalable protocols for authenticated group key exchange,' Proc. of Crypto'03, LNCS 2729, pp. 110-125, 2003
- F. Zhang and X. Chen, 'Attack on an ID-based authenticated group key agreement scheme from' PKC 2004,' Information Proceeding Letters, vol. 91, issue. 4, pp. 191-193, Aug. 2004. https://doi.org/10.1016/j.ipl.2004.04.008
- K. Choi, J. Hwang, and D. Lee, 'Efficient ID-based group key agreement with bilinear maps,' proc. of PKC'04, LNCS 2947, pp. 130-144, 2004
- J. Kim, H. Kim, K. Ha, and K. Yoo, 'One round identity-based authenticated conference agreement protocol,' Proc. of ECUMN 2004, LNCS 3262, pp. 407-416, 2004
- Y. Shi, G. Chen, and J. Li, 'ID-Based one round authenticated group key agreement protocol with bilinear pairings,' Proc. of International Conference on Information Technology: Coding and Computing (ITCC'05), pp. 757-761, Apr. 2005 https://doi.org/10.1109/ITCC.2005.169
- H. Yoon, J. Cheon, and Y. Kim, 'Batch verifications with ID-based signatures,' Proc. of ICISC '04, LNCS 3506, pp. 233-248, 2005
- L. Zhou, W. Susilo, and Y. Mu, 'Efficient ID-based authenticated group key agree-ment from bilinear pairings,' Proc. of Mobile Ad-hoc and Sensor Networks (MSN 2006), LNCS 4325, pp. 521-532, 2006
- K. Shim, 'Further analysis of ID-Based authenticated group key agreement protocol from bilinear maps,' IEICE Trans. Fundamentals, vol. E90-A, no. 1, pp. 295-298, Jan. 2007 https://doi.org/10.1093/ietfec/e90-a.1.295
- K. Choi, J. Hwang, and D. Lee, 'ID-Based authenticated group key agreement secure against insider attacks,' IEICE Trans. Fundamentals, vol. E91-A, no. 7, pp. 1828-1830, July 2008 https://doi.org/10.1093/ietfec/e91-a.7.1828
- G. Yao, H. Wang, and Q. Jiang, 'An authenticated 3-round identity-based group key agreement protocol,' Proc. of the third International Conference on Availability, Reliability, and Security (ARES'08), pp. 538-543, Mar. 2008 https://doi.org/10.1109/ARES.2008.66