An compiler for effective group key exchange protocol to resist insider attack

被引:0
|
作者
Zhang, Zijian [1 ]
Zhu, Liehuang [1 ]
Liao, Lejian [1 ]
机构
[1] School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:313 / 317
相关论文
共 50 条
  • [1] Security Enhancement to a Group Key Transfer Protocol Against Insider Attack
    Huang, Juan
    Li, Yajun
    Liu, Yining
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (11): : 4 - 8
  • [2] A general compiler for password-authenticated group key exchange protocol
    Li, Hui
    Wu, Chuan-Kun
    Sun, Jun
    INFORMATION PROCESSING LETTERS, 2010, 110 (04) : 160 - 167
  • [3] An Insider-Resistant Group Key Exchange Protocol without Signatures
    Huang, Hai
    Cao, Zhenfu
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 657 - 661
  • [4] A general compiler for password-authenticated group key exchange protocol in the standard model
    Wei, Fushan
    Kumar, Neeraj
    He, Debiao
    Yeo, Sang-Soo
    DISCRETE APPLIED MATHEMATICS, 2018, 241 : 78 - 86
  • [5] Key Reuse Attack on NewHope Key Exchange Protocol
    Liu, Chao
    Zheng, Zhongxiang
    Zou, Guangnan
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 163 - 176
  • [6] An improved key exchange protocol for WLAN that can resist MITM attack which benefit from RTT
    Li, Rongsen
    Dou, Wenhua
    Li, R. (rs_li@nudt.edu.cn), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09): : 7357 - 7368
  • [7] Insider attack on a password-based group key agreement
    Li, Hongtu
    Hu, Liang
    Yuan, Wei
    Li, Hongwei
    Chu, Jianfeng
    CEIS 2011, 2011, 15
  • [8] A Secure ID-Based Authenticated Group Key Exchange Protocol Resistant to Insider Attacks
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    Yu, Ching-Wen
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (03) : 915 - 932
  • [9] An unbalanced protocol for group key exchange
    Herranz, J
    Villar, JL
    TRUST AND PRIVACY IN DIGITAL BUSINESS, PROCEEDINGS, 2004, 3184 : 172 - 180
  • [10] A collusion attack on asymmetric group key exchange
    Teng, Jikai
    Wu, Chuankun
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2189 - 2193