Efficiently non-authenticated group key management protocol withstand interruption attack

To overcome the fault that the interruption attack from internal participation of BD<sub>3</sub> protocol, a new scheme was constructed by applying the bilinear map and had the provable security with tight reduction. By analyzing and simulating, compared with another scheme, it was obvio...

Full description

Saved in:
Bibliographic Details
Main Authors: XU Peng1, CUI Guo-hua1, ZHENG Ming-hui2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74650176/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537603384377344
author XU Peng1
CUI Guo-hua1
ZHENG Ming-hui2
author_facet XU Peng1
CUI Guo-hua1
ZHENG Ming-hui2
author_sort XU Peng1
collection DOAJ
description To overcome the fault that the interruption attack from internal participation of BD<sub>3</sub> protocol, a new scheme was constructed by applying the bilinear map and had the provable security with tight reduction. By analyzing and simulating, compared with another scheme, it was obvious that the new scheme was more efficiently than that one. Especially in the quantity of message for communication, it could be approximately 0.14 multiple of that one. On the other hand, the process of simulation simply explaines the method how to carry out the bilinear map, especially how to choose the parameters of it and its signification in the security.
format Article
id doaj-art-3f2d0cfff6dd4b60b46dcf6b5cadf598
institution Kabale University
issn 1000-436X
language zho
publishDate 2009-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-3f2d0cfff6dd4b60b46dcf6b5cadf5982025-01-14T08:27:48ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-0130758074650176Efficiently non-authenticated group key management protocol withstand interruption attackXU Peng1CUI Guo-hua1ZHENG Ming-hui2To overcome the fault that the interruption attack from internal participation of BD<sub>3</sub> protocol, a new scheme was constructed by applying the bilinear map and had the provable security with tight reduction. By analyzing and simulating, compared with another scheme, it was obvious that the new scheme was more efficiently than that one. Especially in the quantity of message for communication, it could be approximately 0.14 multiple of that one. On the other hand, the process of simulation simply explaines the method how to carry out the bilinear map, especially how to choose the parameters of it and its signification in the security.http://www.joconline.com.cn/zh/article/74650176/date and computer securityBD3 protocolinterruption attackbilinear map
spellingShingle XU Peng1
CUI Guo-hua1
ZHENG Ming-hui2
Efficiently non-authenticated group key management protocol withstand interruption attack
Tongxin xuebao
date and computer security
BD3 protocol
interruption attack
bilinear map
title Efficiently non-authenticated group key management protocol withstand interruption attack
title_full Efficiently non-authenticated group key management protocol withstand interruption attack
title_fullStr Efficiently non-authenticated group key management protocol withstand interruption attack
title_full_unstemmed Efficiently non-authenticated group key management protocol withstand interruption attack
title_short Efficiently non-authenticated group key management protocol withstand interruption attack
title_sort efficiently non authenticated group key management protocol withstand interruption attack
topic date and computer security
BD3 protocol
interruption attack
bilinear map
url http://www.joconline.com.cn/zh/article/74650176/
work_keys_str_mv AT xupeng1 efficientlynonauthenticatedgroupkeymanagementprotocolwithstandinterruptionattack
AT cuiguohua1 efficientlynonauthenticatedgroupkeymanagementprotocolwithstandinterruptionattack
AT zhengminghui2 efficientlynonauthenticatedgroupkeymanagementprotocolwithstandinterruptionattack