[1] M. Burmester and Y. Desmedt, “A Secure and Efficient Conference Key Distribution System,” inProceedings of the Eurocrypt 1994, pp. 275-286, Perugia, Italy, May 1994 [2] E. Bresson, O. Chevassut, D. Pointcheval,J. J. Quisquater, “Provably Authenticated Group Diffie-Hellman Key Exchange,” inProceedings of the 8th ACM Conference on Computer and Communications Security, pp. 255-264, Philadelphia, USA, November 2001 [3] K. Y. Choi, J. Y. Hwang,D. H. Lee, “Efficient ID-based Group Key Agreement with Bilinear Maps,” inProceedings of the PKC 2004, pp. 130-144, Singapore, March 2004 [4] M. Abdalla and D. Pointcheval, “A Scalable Password-based Group Key Exchange Protocol in the Standard Model,” inProceedings of the Asiacrypt 2006, pp. 332-347, Shanghai, China, December 2006 [5] Q. H. Wu, Y. Mu, W. Susilo, B. Qin,J. Domingo-Ferrer, “Asymmetric Group Key Agreement,” inProceedings of the Eurocrypt 2009, pp. 153-170, Cologne, Germany, April 2009 [6] Q. H. Wu, B. Qin, L. Zhang,J. Domingo-Ferrer, “Bridging Broadcast Encryption and Group Key Agreement,” inProceedings of the Asiacrypt 2011, pp. 143-160, Seoul, South Korea, December 2011 [7] Q. H. Wu, X. Y. Zhang, M. Tang, P. Yin,Z. L. Qiu, “Extended Asymmetric Group Key Agreement for Dynamic Groups and its Applications,” China Communication, Vol. 8, No. 4, pp. 32-40, September 2011 [8] X. Zhao, D. Wei,H. Wang, “Asymmetric Group Key Agreement with Traitor Traceability,” inProceedings of the 2010 International Conference on Computational Intelligence and Security, pp. 347-351, Nanning, China, December 2010 [9] L. Zhang, Q. H. Wu,B. Qin, “Authenticated Asymmetric Group Key Agreement Protocol and Its Application,” inProceedings of the International Communications Conference (ICC 2010), pp. 1-5, Cape Town, South Africa, May 2010 [10] A. Shamir, “Identity-based Cryptosystems and Signature Schemes,” inProceedings of the Crypto 1984, pp. 47-53, Santa Barbara, California, USA, August 1984 [11] S. S.Al-Riyami and K. G. Paterson, “Certificateless Public Key Cryptography,” inProceedings of the Asiacrypt 2003, pp. 452-473, Taipei, Taiwan, November 2003 [12] M. Girault, “Self-Certified Public Keys,” inProceedings of Eurocrypt 1991, pp. 490-497, Brighton, UK, April 1991 [13] X. W. Zhao, F. G. Zhang,H. B. Tian, “Dynamic Asymmetric Group Key Agreement for Ad Hoc Networks,” Ad Hoc Networks, Vol. 9, No. 5, pp. 928-939, July 2011 [14] L. Zhang, Q. H. Wu, B. Qin,J. Domingo-Ferrer, “Asymmetric Group Key Agreement Protocol for Open Networks and Its Application to Broadcast Encryption,” Computer Networks, Vol. 55, No. 15, pp. 3246-3255, October 2011 [15] C. Xu, Z. J. Li, Y. Mu, H. Guo,T. Guo, “Affiliation-Hiding Authenticated Asymmetric Group Key Agreement,” The Computer Journal, Vol. 55, No. 10, pp. 1180-1191, October 2012 [16] C. Xu, H. Guo, Z. J. Li,Y. Mu, “New Construction of Affiliation-Hiding Authenticated Group Key Agreement,” Security and Communication Networks, Vol. 6, No. 6, pp. 723-734, June 2013 [17] C. Xu, H. Guo, Y. Mu,Z. J. Li, “Affiliation-Hiding Authenticated Asymmetric Group Key Agreement based on Short Signature,” The Computer Journal, Vol. 57, No. 10, pp. 1580-1590, October 2014 [18] L. Zhang, Q. H. Wu, B. Qin,J. Domingo-Ferrer, “Identity-based Authenticated Asymmetric Group Key Agreement Protocol,” inProceedings of the COCOON 2010, pp. 510-519, Nha Trang, Vietnam, July 2010 [19] L. Zhang, Q. H. Wu, B. Qin,J. Domingo-Ferrer, “Provably Secure One-Round Identity-based Authenticated Asymmetric Group Key Agreement Protocol,” Information Sciences, Vol. 181, No. 19, pp. 4318-4329, October 2011 [20] L. Zhang, Q. H. Wu, J. Domingo-Ferrer, B. Qin, S. S. M.Chow, and W. Shi, “Secure One-to-Group Communications Escrow-Free ID-based Asymmetric Group Key Agreement,” inProceedings of the INSCRYPT 2013, pp. 239-254, Guangzhou, China, November 2013 [21] L. Zhang, Q. H. Wu, J. Domingo-Ferrer, B. Qin,Z. M. Dong.“Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications,” IEEE Transactions on Information Forensics and Security, Vol. 10, No. 11, pp. 2352-2364, June 2015 [22] J. T.Li and L. Zhang, “Sender Dynamic, Non-Repudiable, Privacy-Preserving and Strong Secure Group Communication Protocol,” Information Sciences, Vol. 414, No. 1, pp. 187-202, November 2017 [23] G. Y. Wei, X. B. Yang,J. Shao, “Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol,” KSII Transactions on Internet and Information Systems, Vol. 6, No. 12, pp. 3352-3365, December 2012 [24] X. X. Lv, H. Li,B. C. Wang, “Authenticated Asymmetric Group Key Agreement based on Certificateless Cryptosystem,” International Journal of Computer Mathematics, Vol. 91, No. 3, pp. 447-460, March 2014 [25] L. Zhang, Q. H. Wu, B. Qin, H. Deng, J. W. Liu,W. C. Shi, “Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement,” inProceedings of the ISPEC 2014, pp. 496-510, Fuzhou, China, May 2014 [26] L. Zhang, Q. H. Wu, B. Qin, H. Deng, J. T. Li, J. W. Liu, et al., “Certificateless and Identity-based Authenticated Asymmetric Group Key Agreement,” International Journal of Information Security, Vol. 16, No. 5, pp. 559-576, June 2017 [27] X. Huang, Y. Mu, W. Susilo, D. S. Wong,W. Wu, “Certificateless Signature Revisited,” inProceedings of the ACISP 2007, pp. 308-322, Townsville, Australia, July 2007 [28] S. Seo, K. Choi, J. Hwang,S. Kim, “Efficient Certificateless Proxy Signature Scheme with Provable Security,” Information Sciences, Vol. 188, No. 1, pp. 322-337, April 2012 [29] H. Y. Sun, Q. Y Wen,W. M. Li, “A Strongly Secure Pairing-Free Certificateless Authenticated Key Agreement Protocol under the CDH Assumption,” SCIENCE CHINA Information Sciences, Vol. 59, No. 3, pp. 032109:1-032109:16, March 2016 |