Efficiently non-authenticated group key management protocol withstand interruption attack

To overcome the fault that the interruption attack from internal participation of BD<sub>3</sub> protocol, a new scheme was constructed by applying the bilinear map and had the provable security with tight reduction. By analyzing and simulating, compared with another scheme, it was obvio...

Full description

Saved in:
Bibliographic Details
Main Authors: XU Peng1, CUI Guo-hua1, ZHENG Ming-hui2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74650176/
Tags: Add Tag
No Tags, Be the first to tag this record!