Efficiently non-authenticated group key management protocol withstand interruption attack
To overcome the fault that the interruption attack from internal participation of BD<sub>3</sub> protocol, a new scheme was constructed by applying the bilinear map and had the provable security with tight reduction. By analyzing and simulating, compared with another scheme, it was obvio...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74650176/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537603384377344 |
---|---|
author | XU Peng1 CUI Guo-hua1 ZHENG Ming-hui2 |
author_facet | XU Peng1 CUI Guo-hua1 ZHENG Ming-hui2 |
author_sort | XU Peng1 |
collection | DOAJ |
description | To overcome the fault that the interruption attack from internal participation of BD<sub>3</sub> protocol, a new scheme was constructed by applying the bilinear map and had the provable security with tight reduction. By analyzing and simulating, compared with another scheme, it was obvious that the new scheme was more efficiently than that one. Especially in the quantity of message for communication, it could be approximately 0.14 multiple of that one. On the other hand, the process of simulation simply explaines the method how to carry out the bilinear map, especially how to choose the parameters of it and its signification in the security. |
format | Article |
id | doaj-art-3f2d0cfff6dd4b60b46dcf6b5cadf598 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2009-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-3f2d0cfff6dd4b60b46dcf6b5cadf5982025-01-14T08:27:48ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-0130758074650176Efficiently non-authenticated group key management protocol withstand interruption attackXU Peng1CUI Guo-hua1ZHENG Ming-hui2To overcome the fault that the interruption attack from internal participation of BD<sub>3</sub> protocol, a new scheme was constructed by applying the bilinear map and had the provable security with tight reduction. By analyzing and simulating, compared with another scheme, it was obvious that the new scheme was more efficiently than that one. Especially in the quantity of message for communication, it could be approximately 0.14 multiple of that one. On the other hand, the process of simulation simply explaines the method how to carry out the bilinear map, especially how to choose the parameters of it and its signification in the security.http://www.joconline.com.cn/zh/article/74650176/date and computer securityBD3 protocolinterruption attackbilinear map |
spellingShingle | XU Peng1 CUI Guo-hua1 ZHENG Ming-hui2 Efficiently non-authenticated group key management protocol withstand interruption attack Tongxin xuebao date and computer security BD3 protocol interruption attack bilinear map |
title | Efficiently non-authenticated group key management protocol withstand interruption attack |
title_full | Efficiently non-authenticated group key management protocol withstand interruption attack |
title_fullStr | Efficiently non-authenticated group key management protocol withstand interruption attack |
title_full_unstemmed | Efficiently non-authenticated group key management protocol withstand interruption attack |
title_short | Efficiently non-authenticated group key management protocol withstand interruption attack |
title_sort | efficiently non authenticated group key management protocol withstand interruption attack |
topic | date and computer security BD3 protocol interruption attack bilinear map |
url | http://www.joconline.com.cn/zh/article/74650176/ |
work_keys_str_mv | AT xupeng1 efficientlynonauthenticatedgroupkeymanagementprotocolwithstandinterruptionattack AT cuiguohua1 efficientlynonauthenticatedgroupkeymanagementprotocolwithstandinterruptionattack AT zhengminghui2 efficientlynonauthenticatedgroupkeymanagementprotocolwithstandinterruptionattack |