نتایج جستجو برای: group key

تعداد نتایج: 1484350  

Journal: :Adv. in Math. of Comm. 2010
Rainer Steinwandt Adriana Suárez Corona

Motivated by the problem of establishing a session key among parties based on the possession of certain credentials only, we discuss a notion of attribute-based key establishment. A number of new issues arise in this setting that are not present in the usual settings of group key establishment where unique user identities are assumed to be publicly available. After detailing the security model,...

2013
Ramana Murthy Srinivasa Rao

Key transfer protocols needs key generation center (KGC) to select and transport session keys to all communication entities secretly, that are mutually trusted. Often, during registration each entity shares a session keys that are encrypted under another secret key by the KGC. In this paper based on secret sharing scheme, we propose an authenticated key transfer protocol that once KGC can broad...

Journal: :IACR Cryptology ePrint Archive 2004
Qiang Tang Chris J. Mitchell

In this paper we analyse three improved authenticated group key agreement schemes, all of which are based on the conference key distribution systems proposed by Burmester and Desmedt. We show that all the schemes suffer from a type of impersonation attack, although these schemes are claimed to be secure.

Journal: :IACR Cryptology ePrint Archive 2006
Emmanuel Bresson Mark Manulis Jörg Schwenk

Group key exchange (GKE) protocols can be used to guarantee confidentiality and group authentication in a variety of group applications. The notion of provable security subsumes the existence of an abstract formalization (security model) that considers the environment of the protocol and identifies its security goals. The first security model for GKE protocols was proposed by Bresson, Chevassut...

2002
Ahmet M. Eskicioglu

Multicast is an internetwork service that provides efficient delivery of data from a source to multiple receivers. It reduces the bandwidth requirements of the network and the computational overhead of the host devices. This makes multicast an ideal technology for communication among a large group of participants. Secure group communications involves many service types include teleconferencing,...

2016
Yoshikazu Hanatani Naoki Ogura Yoshihiro Ohba Lidong Chen Subir Das

Controlling a large number of devices such as sensors and smart end points, is always a challenge where scalability and security are indispensable. This is even more important when it comes to periodic configuration updates to a large number of such devices belonging to one or more groups. One solution could be to take a group of devices as a unit of control and then manage them through a group...

2002
Patrick P. C. Lee John C. S. Lui David K. Y. Yau

We consider several distributed collaborative key agreement protocols for dynamic peer groups. This problem has several important characteristics which make it different from traditional secure group communication. They are (1) distributed nature in which there is no centralized key server, (2) collaborative nature in which the group key is contributory; i.e., each group member will collaborati...

Journal: :I. J. Network Security 2016
Chung-Huei Ling Shih-Ming Chen Min-Shiang Hwang

Recently, Tseng and Wu pointed out that the second protocol of Biswas’s two-party keys scheme based on the Diffie-Hellman technique has a security weakness and proposed a new protocol to remedy the weakness. In this article, we point out that Tseng-Wu’s protocol is vulnerable to a man-in-the-middle attack. An attacker could intercept, delete, or modify the communicated messages between two comm...

Journal: :EURASIP J. Wireless Comm. and Networking 2006
Win Aye Mohammad Umar Siddiqi

Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for ...

Journal: :IACR Cryptology ePrint Archive 2003
Ho-Kyu Lee Hyang-Sook Lee Young-Ran Lee

In this paper, we extend the 2-party key exchange protocol on braid groups to the group key agreement protocol based on the hardness of Ko-Lee problem. We also provide authenticity to the group key agreement protocol.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید