An compiler for effective group key exchange protocol to resist insider attack

被引:0
|
作者
Zhang, Zijian [1 ]
Zhu, Liehuang [1 ]
Liao, Lejian [1 ]
机构
[1] School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:313 / 317
相关论文
共 50 条
  • [31] Partially known information attack on SM2 key exchange protocol
    Wei, Wei
    Chen, Jiazhe
    Li, Dan
    Wang, Beibei
    SCIENCE CHINA-INFORMATION SCIENCES, 2019, 62 (03)
  • [32] Partially known information attack on SM2 key exchange protocol
    Wei WEI
    Jiazhe CHEN
    Dan LI
    Beibei WANG
    Science China(Information Sciences), 2019, 62 (03) : 61 - 74
  • [33] Partially known information attack on SM2 key exchange protocol
    Wei Wei
    Jiazhe Chen
    Dan Li
    Beibei Wang
    Science China Information Sciences, 2019, 62
  • [34] Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2638 - 2640
  • [35] Can PoW Consensus Protocol Resist the Whale Attack?
    Sun, Xueyong
    Bao, Qihao
    Li, Bixin
    2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 504 - 515
  • [36] Design of key establishment protocol using one-way functions to avert insider-replay attack
    Saha, Mounita
    RoyChowdhury, Dipanwita
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 194 - +
  • [37] On a Key Exchange Protocol
    Barcau, Mugurel
    Pasol, Vicentiu
    Plesca, Cezar
    Togan, Mihai
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 187 - 199
  • [38] A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols
    Kreuzer, M.
    Myasnikov, A. D.
    Ushakov, A.
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 37 - 43
  • [39] Dynamic tree-based authenticated group key exchange protocol
    LI Hui 1
    2 Graduate University of Chinese Academy of Sciences
    Science China(Information Sciences), 2010, 53 (08) : 1591 - 1602
  • [40] Dynamic tree-based authenticated group key exchange protocol
    Hui Li
    ChuanKun Wu
    JiKai Teng
    Science China Information Sciences, 2010, 53 : 1591 - 1602