
- 1998. In Proceedings of the Conference on Advances in Cryptology (EUROCRYPT’98). Vol. 1403. Helsinki, Finland, 127--144.Google Scholar
- Ahmed Abdel-Harfez, Ali Miri, and Luiz Orozco-Barbosa. 2007. Authenticated group key agreement protocols for ad hoc wireless networks. Int. J. Netw. Secur. 4 (2007), 90--98.Google Scholar
- Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, and Gene Tsudik. 2004. On the performance of group key agreement protocols. ACM Trans. Inf. Syst. Secur. 7, 3 (Aug. 2004), 457--488.Google Scholar
Digital Library
- Daniel Augot, Raghav Bhaskar, Valerie Issarny, and Daniele Sacchetti. 2007. A three round authenticated group key agreement protocol for ad hoc networks. Pervas. Mobile Comput. 3 (2007), 36--52.Google Scholar
Digital Library
- M. Backes, C. Cachin, and A. Oprea. 2005. Lazy revocation in cryptographic file systems. In Proceedings of the 3rd IEEE International Security in Storage Workshop (SISW’05).Google Scholar
- Dan Boneh, Xavier Boyen, and Eu-Jin Goh. 2005. Hierarchical identity based encryption with constant size ciphertext. In Proceedings of the Conference on Advances in Cryptology (EUROCRYPT’05), Ronald Cramer (Ed.). 440--456.Google Scholar
Digital Library
- Mike Burmester and Yvo Desmedt. 1994. A secure and efficient conference key distribution system (extended abstract). In Proceedings of the Conference on Advances in Cryptology (EUROCRYPT’94). Springer, 275--286.Google Scholar
- Chin-Chen Chang, Hao-Chuan Tsai, Pen-Yi Chang Lijun Chu, Xuefeng Zheng, and Shaojie Wang. 2007. A collaborative conference key agreement scheme by using an intermediary node. In Proceedings of the International Conference on Convergence Information Technology. IEEE, 54--59.Google Scholar
Digital Library
- M. L. Chaudhry and J. G. C. Templeton. 1983. A First Course in Bulk Queues. Wiley, New York.Google Scholar
- Jiin-Chiou Cheng and Chi-Sung Laih. 2009. Conference key agreement protocol with non-interactive fault-tolerance over broadcast network. Int. J. Inform. Sec. 8 (2009), 1.Google Scholar
- Zi-Yao Cheng, Yun Liu, Chin-Chen Chang, and Cheng Guo. 2013. A fault-tolerant group key agreement protocol exploiting dynamic setting. Int. J. Commun. Syst. 26 (2013), 259--275.Google Scholar
Digital Library
- Cheong Hyeon Choi. 2013. Adaptation of Weil pairing IBE for secure file sharing. In Proceedings of the 5th International Conference on Advances in Databases, Knowledge, and Data Applications (GlobeNet’13). 59--65.Google Scholar
- Yu-Fang Chung. 2013. The design of authentication key protocol in certificate-free public key cryptosystem. Security and Communication Networks 7, 11 (2013), 2125--2133. DOI:10.1002/sec.924 (2013).Google Scholar
Digital Library
- Whitfield Diffie, Paul C. van Oorschot, and Michael J. Wiener. 1992. Authentication and authenticated key exchanges. Des. Codes Cryptogr. 2 (1992), 107--125.Google Scholar
Digital Library
- Allen B. Downey. 2001. The structural cause of file size distributions. SIGMETRICS Perform. Eval. Rev. 29, 1 (June 2001), 328--329.Google Scholar
Digital Library
- Orhan Ermiş, Şerif Bahtiyar, Emin Anarım, and M. Ufuk Çağlayan. 2013. An improved fault-tolerant conference-key agreement protocol with forward secrecy. In Proceedings of the 6th International Conference on Security of Information and Networks (SIN’13). 306--310.Google Scholar
Digital Library
- Orhan Ermiş, Şerif Bahtiyar, Emin Anarim, and M. Ufuk Çağlayan. 2017. A comparative study on the scalability of dynamic group key agreement protocols. In Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES’17). 62:1--62:6.Google Scholar
Digital Library
- Orhan Ermiş, Şerif Bahtiyar, Emin Anarım, and M. Ufuk Çağlayan. 2017. A secure and efficient group key agreement approach for mobile ad hoc networks. Ad Hoc Netw. 67, C (Dec. 2017), 24--39.Google Scholar
- Orhan Ermis, Serif Bahtiyar, Emin Anarim, and M. Ufuk Caglayan. 2017. A key agreement protocol with partial backward confidentiality. Comput. Netw. 129, Part 1 (2017), 159--177.Google Scholar
Digital Library
- Rakesh Chandra Gangwar and Anil K. Sarje. 2006. Secure and efficient dynamic group key agreement protocol for an ad hoc network. In Proceedings of the International Symposium on Ad Hoc and Ubiquitous Computing (ISAUHC’06). IEEE, 56--61.Google Scholar
- G. Gonçalves, I. Drago, A. P. C. d. Silva, A. B. Vieira, and J. M. Almeida. 2014. Modeling the dropbox client behavior. In Proceedings of the IEEE International Conference on Communications (ICC’14). 1332--1337.Google Scholar
- K. H. Huang, E. C. Chang, and C. L. Chang. 2013. Secure file sharing scheme for mobile devices. In Proceedings of the 4th International Conference on Networking and Distributed Computing. 82--84.Google Scholar
- Kuo-Hsuan Huang, Yu-Fang Chung, Hsiu-Hui Lee, Feipei Lai, and Tzer-Shyong Chen. 2009. A conference key agreement protocol with fault-tolerant capability. Comput. Stand. Interf. 31 (2009), 401--405.Google Scholar
Digital Library
- Luan Ibraimi, Milan Petkovic, Svetla Nikova, Pieter Hartel, and Willem Jonker. 2009. Information security applications. In Information Security Applications, Heung Youl Youm and Moti Yung (Eds.). Springer-Verlag, Berlin, 309--323.Google Scholar
- Ingemar Ingemarsson, Donald T. Tang, and C. K. Wong. 1982. A conference key distribution system. IEEE Trans. Inform. Theor. 28 (1982), 714--719.Google Scholar
Digital Library
- Yongdae Kim, Adrian Perrig, and Gene Tsudik. 2004. Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7, 1 (Feb. 2004), 60--96.Google Scholar
Digital Library
- Mingchu Li, Xiaodong Xu, Cheng Guo, and Xing Tan. [2016]. AD-ASGKA—Authenticated dynamic protocols for asymmetric group key agreement. Secur. Commun. Netw. 9, 11 (2016), 1340--1352.Google Scholar
Digital Library
- Qin Liu, Guojun Wang, and Jie Wu. 2014. Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258 (Feb. 2014), 355--370.Google Scholar
- Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yan. 2013. Mona: Secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24, 6 (June 2013), 1182--1191.Google Scholar
Digital Library
- M. Malarvizhi, J. A. J. Sujana, and T. Revathi. 2014. Secure file sharing using cryptographic techniques in cloud. In Proceedings of the International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE’14). IEEE, 1--6.Google Scholar
- Toshiko Matsumoto, Takashi Onoyama, and Norihisa Komoda. 2014. Efficient Operational Management of Enterprise File Server with File Size Distribution Model. Springer Netherlands, Dordrecht, 599--609.Google Scholar
- Michael Mitzenmacher. 2003. Dynamic models for file sizes and double Pareto distributions. Internet Math. 1, 3 (2003), 305--333.Google Scholar
Cross Ref
- T. S. R. Murthy, Sivarama Krishna, and G. V. S Raju. 2012. Interdependent queueing model with varying bulk service. Int. J. Math. Soft Comput. 2, 1 (2012).Google Scholar
Cross Ref
- G. F. Newell. 1966. The M/G/∞ queue. SIAM J. Appl. Math. 14, 1 (1966), 86--88.Google Scholar
Cross Ref
- Anthony J. Saibert. 2018. Archiving: Fundamentals of Storage Technology. Retrieved from: http://siim.org/page/archiving_chapter2.Google Scholar
- Kunwadee Sripanidkulchai, Bruce Maggs, and Hui Zhang. 2004. An analysis of live streaming workloads on the Internet. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC’04). 41--54.Google Scholar
Digital Library
- V. Sundarapandian. 2009. Queueing Theory. PHI Learning, India. 686--749 pages.Google Scholar
- Yang Tang, Patrick P. C. Lee, John C. S. Lui, and Radia Perlman. 2012. Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Depend. Secur. Comput. 9, 6 (Nov. 2012), 903--916.Google Scholar
Digital Library
- J. Teng and C. Wu. 2016. An identity-based group key agreement protocol for low-power mobile devices. Chinese J. Electron. 25, 4 (2016), 726--733.Google Scholar
Cross Ref
- Yuh-Min Tseng. 2005. An improved conference-key agreement protocol with forward secrecy. Informatica, Lith. Acad. Sci. 16 (2005), 275--284.Google Scholar
Digital Library
- Yuh-Min Tseng. 2007. A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy. J. Syst. Softw. 80 (2007), 1091--1101.Google Scholar
Digital Library
- Wen-Guey Tzeng. 2000. A practical and secure fault-tolerant conference-key agreement protocol. In Proceedings of the International Workshop on Public Key Cryptography. Springer, 1--13.Google Scholar
Cross Ref
- Wen-Guey Tzeng. 2002. A secure fault-tolerant conference-key agreement protocol. IEEE Trans. Comput. 51 (2002), 373--379.Google Scholar
Digital Library
- F. Wang, J. Liu, and Y. Xiong. 2008. Stable peers: Existence, importance, and application in peer-to-peer live video streaming. In Proceedings of th 27th Conference on Computer Communications (IEEE INFOCOM’08). 1364--1372.Google Scholar
- Guojun Wang, Qin Liu, Jie Wu, and Minyi Guo. 2011. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30, 5 (July 2011), 320--331.Google Scholar
Digital Library
- Brent Waters. 2011. In Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography(PKC’11). Springer Berlin, 53--70.Google Scholar
- Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou. 2010. Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS’10). 261--270.Google Scholar
Digital Library
- L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, and Z. Dong. 2015. Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications. IEEE Trans. Inform. Forens. Secur. 10, 11 (2015), 2352--2364.Google Scholar
Cross Ref
- Jianjie Zhao, Dawu Gu, and Yali Li. 2010. An efficient fault-tolerant group key agreement protocol. Comput. Commun. 33 (2010), 890--895.Google Scholar
Digital Library
- Zhongma Zhu and Rui Jiang. 2016. A secure anti-collusion data sharing scheme for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 27, 1 (Jan. 2016), 40--50.Google Scholar
Digital Library
Index Terms
Analytical Models for the Scalability of Dynamic Group-key Agreement Protocols and Secure File Sharing Systems
Recommendations
Collusive attacks to "circle-type" multi-party quantum key agreement protocols
We find that existing multi-party quantum key agreement (MQKA) protocols designed for fairness of the key are, in fact, unfair. Our analysis shows that these protocols are sensitive to collusive attacks; that is, dishonest participants can collaborate ...
A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols
ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and SecurityWith the pervasive use of communications technologies, security of multiparty communication systems becomes crucial more than ever. However, providing a secure communication in distributed and dynamic networks is a challenging issue. Dynamic group key ...
Constructing UC secure and constant-round group key exchange protocols via secret sharing
Group key exchange (GKE) is one of the basic building blocks in securing group communication. A number of solutions to GKE problem have been proposed, but most of them are not scalable and require a number of rounds linear with the number of group ...






Comments