Efficiently non-authenticated group key management protocol withstand interruption attack
To overcome the fault that the interruption attack from internal participation of BD<sub>3</sub> protocol, a new scheme was constructed by applying the bilinear map and had the provable security with tight reduction. By analyzing and simulating, compared with another scheme, it was obvio...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74650176/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!