Efficiently non-authenticated group key management protocol withstand interruption attack
To overcome the fault that the interruption attack from internal participation of BD<sub>3</sub> protocol, a new scheme was constructed by applying the bilinear map and had the provable security with tight reduction. By analyzing and simulating, compared with another scheme, it was obvio...
Saved in:
Main Authors: | XU Peng1, CUI Guo-hua1, ZHENG Ming-hui2 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74650176/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Verifier-based password-authenticated key exchange protocol for three-party
by: LI Wen-min, et al.
Published: (2008-01-01) -
Opportune moments for task interruptions: examining the cognitive mechanisms underlying interruption-timing effects
by: Patricia Hirsch, et al.
Published: (2025-01-01) -
Efficient identification protocol provably secure in standard model
by: LI Yan-ping1, et al.
Published: (2009-01-01) -
Research of STR multicast key management protocol based on bilinear pairing in ad hoc network
by: ZHOU Fu-cai1, et al.
Published: (2008-01-01) -
Encoding Interruptions in Parliamentary Data: From Applause to Interjections and Laughter
by: Tanja Wissik
Published: (2022-06-01)