Group key

In cryptography, a group key is a cryptographic key that is shared between a group of users. Typically, group keys are distributed by sending them to… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In recent years, collaborative and group-oriented applications and protocols have gained popularity. These applications typically… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Secure and reliable group communication is an active area of research. Its popularity is fueled by the growing importance of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Traditionally, research in secure group key agreement focuses on minimizing the computational overhead for cryptographic… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Secure media broadcast over the Internet poses unique security challenges. One problem access control to a large number of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
ÐAs a result of the increased popularity of group-oriented applications and protocols, group communication occurs in many… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2000
Highly Cited
2000
ABSTRACT Se ure group ommuni ation is an in reasingly popular resear h area having re eived mu h attention in re ent years. The… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
hlany modern computing environments involve dynamic peer groups. Distributed Simdation, mtiti-user games, conferencing and… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 2
  • figure 5
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Ever since a-party Diffie-Hellman key exchange was first proposed in 1976, there have been efforts to extend its simplicity and… (More)
Is this relevant?