1. Asmuth C., Bloom J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983).
2. Blakley G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, vol. 48, pp. 313–317 (1979).
3. Boyd C.: On key agreement and conference key agreement. In: Australasian Conference on Information Security and Privacy, pp. 294–302. Springer, Berlin (1997).
4. Bresson E., Chevassut O., Pointcheval D.: Provably secure authenticated group Diffie–Hellman key exchange. ACM Trans. Inf. Syst. Secur. (TISSEC) 10(3), 10 (2007).
5. Chen L.Q., Sun C.F., Xu C.J.: An authenticated group key agreement scheme for wireless sensor networks based on bilinear pairings. Adv. Mater. Res. 846, 876–882 (2014).