搜索结果: 1-15 共查到“军队指挥学 Group key agreement”相关记录21条 . 查询时间(0.091 秒)
Practical Supersingular Isogeny Group Key Agreement
Group key agreement isogenies post-quantum cryptography
2019/4/3
We present the first quantum-resistant nn-party key agreement scheme based on supersingular elliptic curve isogenies. We show that the scheme is secure against quantum adversaries, by providing a secu...
Physical Layer Group Key Agreement for Automotive Controller Area Networks
Automotive security ECU keys CAN bus
2016/6/8
Distribution of cryptographic keys between devices communicating over a publicly accessible medium is an important component of secure design for networked systems. In this paper, we consider the prob...
On the Security of an Efficient Group Key Agreement Scheme for MANETs
Key agreement MANET Cryptanalysis
2016/1/3
Yang et al. have proposed an efficient group key agreement scheme for Mobile
Adhoc Networks. The scheme is efficient as only one bilinear computation
is required for group members to obtain the sess...
On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks
passive attack forward secrecy backward secrecy
2013/2/21
Recently, Islam and Biswas proposed a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks. However, in this letter, we point out that this protocol ca...
Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
group key agreement imbalanced mobile networks
2013/2/21
Recently, Isalam and Biswas proposed a new group key agreement (GKA) protocol for imbalanced mobile networks. In this letter, we will show that Isalam et al.’s GKA protocol is not secure.
Stronger Security Model of Group Key Agreement
Group key agreement Ephemeral key leakage attack Security model Provable security
2010/9/26
In PKC 2009, Gorantla, Boyd and Gonz\'{a}lez Nieto presented a nice result on modelling security for group key agreement (GKA) protocols. They proposed a novel security model (GBG model) that better s...
Two Attacks on Dutta’s Dynamic Group Key Agreement Protocol
attack group key agreement dynamic impersonation
2010/9/9
Ratna Dutta and Rana Barua proposed a dynamic group key agreement protocol with constant round referred to as DGKA protocol. They claimed that the DGKA protocol is dynamic, efficient and provably secu...
Survival in the Wild:Robust Group Key Agreement in Wide-Area Networks
Group Key Agreement Fault Tolerance Robustness
2009/6/5
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure
group communication. GKA is very useful in many types of peer group scenarios and applications...
Secure and reliable group communication is an active area of research. Its popularity is caused by the
growing importance of group-oriented and collaborative applications. The central research challe...
An Improved ID-based Authenticated Group Key Agreement Scheme
Authenticated group key agreement Bilinear pairings Identity-based cryptography
2009/4/10
Authenticated group key agreement problem is important in many modern collaborative and distributed applications. There are two ID-based authenticated group key agreement schemes have been proposed by...
Attack on Two ID-based Authenticated Group Key Agreement Schemes
Authenticated group key agreement Bilinear pairings ID-based cryptography
2009/4/10
Authenticated group key agreement problem is important
in many modern collaborative and distributed applications. Recently,
there are two ID-based authenticated group key agreement schemes have
bee...
An Authenticated Group Key Agreement Protocol on Braid groups
braid groups conjugacy problem key agrement protocol
2009/4/8
In this paper, we extend the 2-party key exchange protocol on braid groups
to the group key agreement protocol based on the hardness of Ko-Lee problem. We also
provide authenticity to the group key ...
Rethinking the security of some authenticated group key agreement schemes
Rethinking authenticated group key agreement schemes
2009/4/3
In this paper we analyse three improved authenticated group key agreement
schemes, all of which are based on the conference key distribution systems
proposed by Burmester and Desmedt. We show that a...
Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices
Group key agreement key authentication forward secrecy
2009/3/27
In this paper, we show that Bresson-Chevassut-Essiari-Pointcheval's group key
agreement scheme does not meet the main security properties: implicit key authentication,
forward secrecy, and known key...
DDH-based Group Key Agreement in a Mobile Environment
group key agreement multicast security model DDH
2009/3/27
A group key agreement protocol is designed to efficiently implement secure mul-
ticast channels for a group of parties communicating over an untrusted, open network by
allowing them to agree on a co...