Cryptographic schemes that provide establishment of secret keys among a number of participants are generally known as conference key establishment schemes and key broadcasting schemes. In any case, such protocols provide secure establishment of group-oriented cryptographic keys, but with the costs of multiple transmissions of key establishment messages and in some cases multiple secret user keys. In this paper, we present a simple and straightforward efficient non-interactive group-oriented key establishment scheme that provides off-line computation of secret group keys, without computations and transmissions of key establishment messages
If the inline PDF is not rendering correctly, you can download the PDF file here.
 DIFFIE W.-HELLMAN M.: New directions in cryptography IEEE Trans. Inform. Theory 22 (1976) 644-654.
 INGEMARSSON I.-TANG D.-WONG C.: A conference key distribution system IEEE Trans. Inform. Theory 28 (1982) 714-720.
 BURMESTER M.-DESMEDT Y.: A secure and efficient conference key distribution system in: Advances in Cryptology-EUROCRYPT ’94 (A. De Santis ed.) Workshop on the Theory and Appl. of Cryptographic Techniques Perugia Italy 1994 Lecture Notes in Comput. Sci. Vol. 950 Springer Berlin 1994 pp. 275-286.
 STEINER M.-TSUDIK G.-WAIDNER M.: Diffie-Hellman key distribution extended to group communication in: Proc. of the 3rd ACM Conf. on Comput. and Commun. Security-CCS ’96 ACM New York 1996 pp. 31-37.
 ATENIESE G.-STEINER M.-TSUDIK G.: Autenticated group key agreement and friends in: Proc. of the 4th ACM Conf. on Comput. and Commun. Security-CCS ’98 ACM New York 1998 pp. 17-26.
 BOYD C.-MATHURIA A.: Protocols for Authentication and Key Establishment in: Information Security and Cryptography Springer Berlin 2003.
 FIAT A.-NAOR M.: Broadcast encryption in: Advances in Cryptology-CRYPTO ’93 Lecture Notes in Comput. Sci. Vol. 773 Springer Berlin 1994 pp. 480-491.
 BACH E.: Discrete Logarithms and Factoring University of California at Berkeley Berkeley CA USA 1984.
 BROWN D. R. L.-GALLANT R. P.: The Static Diffie-Hellman Problem Cryptology ePrint Archive Report 2004/306 2004