{"id":"https://openalex.org/W1990442702","doi":"https://doi.org/10.1109/icc.2010.5501983","title":"Authenticated Asymmetric Group Key Agreement Protocol and Its Application","display_name":"Authenticated Asymmetric Group Key Agreement Protocol and Its Application","publication_year":2010,"publication_date":"2010-05-01","ids":{"openalex":"https://openalex.org/W1990442702","doi":"https://doi.org/10.1109/icc.2010.5501983","mag":"1990442702"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2010.5501983","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2010.5501983","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020615823","display_name":"L. Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I55952717","display_name":"Universidad Rovira i Virgili","ror":"https://ror.org/00g5sqv46","country_code":"ES","type":"education","lineage":["https://openalex.org/I55952717"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"L. Zhang","raw_affiliation_strings":["Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Catalonia, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Catalonia, Spain","institution_ids":["https://openalex.org/I55952717"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022955566","display_name":"Qianhong Wu","orcid":"https://orcid.org/0000-0002-6407-4194"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I55952717","display_name":"Universidad Rovira i Virgili","ror":"https://ror.org/00g5sqv46","country_code":"ES","type":"education","lineage":["https://openalex.org/I55952717"]}],"countries":["CN","ES"],"is_corresponding":false,"raw_author_name":"Q. Wu","raw_affiliation_strings":["Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Catalonia, Spain","School of Computer, Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education, Wuhan University of China, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Catalonia, Spain","institution_ids":["https://openalex.org/I55952717"]},{"raw_affiliation_string":"School of Computer, Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education, Wuhan University of China, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101742688","display_name":"Bo Qin","orcid":"https://orcid.org/0000-0003-2875-4595"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]},{"id":"https://openalex.org/I55952717","display_name":"Universidad Rovira i Virgili","ror":"https://ror.org/00g5sqv46","country_code":"ES","type":"education","lineage":["https://openalex.org/I55952717"]}],"countries":["CN","ES"],"is_corresponding":false,"raw_author_name":"B. Qin","raw_affiliation_strings":["Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Catalonia, Spain","School of Science, Department of Maths, Xi''an University of Technology, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Catalonia, Spain","institution_ids":["https://openalex.org/I55952717"]},{"raw_affiliation_string":"School of Science, Department of Maths, Xi''an University of Technology, China","institution_ids":["https://openalex.org/I4210131919"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020615823"],"corresponding_institution_ids":["https://openalex.org/I55952717"],"apc_list":null,"apc_paid":null,"fwci":1.11277069,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.76995383,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.7475412487983704},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7436169981956482},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6551662683486938},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.640498161315918},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6326864957809448},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5926481485366821},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.534157395362854},{"id":"https://openalex.org/keywords/group","display_name":"Group (periodic table)","score":0.47300106287002563},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44713330268859863},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.42495888471603394},{"id":"https://openalex.org/keywords/shared-secret","display_name":"Shared secret","score":0.4230799674987793},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.41359350085258484},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.3531118631362915}],"concepts":[{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.7475412487983704},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7436169981956482},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6551662683486938},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.640498161315918},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6326864957809448},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5926481485366821},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.534157395362854},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.47300106287002563},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44713330268859863},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.42495888471603394},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.4230799674987793},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.41359350085258484},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.3531118631362915},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2010.5501983","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2010.5501983","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.75}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321505","display_name":"Generalitat de Catalunya","ror":"https://ror.org/01bg62x04"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W25261110","https://openalex.org/W1482965486","https://openalex.org/W1519891470","https://openalex.org/W1522268755","https://openalex.org/W1527077352","https://openalex.org/W1535945812","https://openalex.org/W1537090015","https://openalex.org/W1569083856","https://openalex.org/W1665450113","https://openalex.org/W1709517452","https://openalex.org/W1806049065","https://openalex.org/W1905774212","https://openalex.org/W1994386233","https://openalex.org/W1998368731","https://openalex.org/W2011210778","https://openalex.org/W2116556172","https://openalex.org/W2135042651","https://openalex.org/W2156186849","https://openalex.org/W2914756988","https://openalex.org/W2953151355","https://openalex.org/W4238634196","https://openalex.org/W6601021267","https://openalex.org/W6628982038","https://openalex.org/W6631487964","https://openalex.org/W6632069614","https://openalex.org/W6637323416","https://openalex.org/W6637580721","https://openalex.org/W6638341401","https://openalex.org/W6640072080","https://openalex.org/W6677607623"],"related_works":["https://openalex.org/W4378471218","https://openalex.org/W2899258559","https://openalex.org/W1972417273","https://openalex.org/W2354579208","https://openalex.org/W757895870","https://openalex.org/W2613850739","https://openalex.org/W4205570574","https://openalex.org/W1987780107","https://openalex.org/W3174772455","https://openalex.org/W2134637773"],"abstract_inverted_index":{"A":[0],"recent":[1],"primitive":[2],"known":[3],"as":[4],"asymmetric":[5,74],"group":[6,11,43,75],"key":[7,19,76],"agreement":[8,77],"allows":[9],"a":[10,16,95,102],"of":[12],"users":[13,44],"to":[14,23,50,54,105,110],"negotiate":[15],"common":[17],"encryption":[18,97],"which":[20,79],"is":[21,60,122],"accessible":[22],"any":[24,48],"entities":[25],"while":[26],"each":[27],"user":[28],"holds":[29],"her":[30],"respective":[31],"secret":[32,108],"decryption":[33],"key.":[34],"This":[35],"concept":[36],"not":[37],"only":[38,61],"enables":[39],"confidential":[40],"communications":[41],"among":[42],"but":[45],"also":[46,116],"permits":[47],"outsider":[49],"send":[51],"encrypted":[52],"messages":[53],"the":[55,81,107,111,120,125],"group.":[56],"The":[57],"existing":[58],"instantiation":[59],"secure":[62],"against":[63,85],"passive":[64],"adversaries.":[65],"In":[66],"this":[67],"paper,":[68],"we":[69,92],"first":[70],"propose":[71,94],"an":[72],"authenticated":[73],"protocol":[78],"captures":[80],"practical":[82],"security":[83,128],"properties":[84],"active":[86],"attacks.":[87],"Based":[88],"on":[89,101],"our":[90],"protocol,":[91],"then":[93],"broadcast":[96],"system":[98,114],"without":[99],"relying":[100],"trusted":[103],"dealer":[104],"distribute":[106],"keys":[109],"users.":[112],"Our":[113],"has":[115],"short":[117],"ciphertexts.":[118],"Furthermore,":[119],"proposal":[121],"equipped":[123],"with":[124],"perfect":[126],"forward":[127],"property.":[129]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
