نتایج جستجو برای: group key

تعداد نتایج: 1484350  

2010
Vankamamidi S. Naresh

Ever since 2-party Diffie-Hellman exchange was first proposed in 1976, there have been efforts to extend its simplicity and elegance to a group setting. Notable solutions have been proposed by michael Steiner Gene Tsudik Waidner(in 1996) and Recently G.P.Biswas was proposed a contributory group key agreement protocol for generation of multiparty key and compared with other protocol and satisfac...

2015
Hui Xie Yongjie Yan Sihui Shu

Several protocols implementing attribute-based group key exchange, which allows users with certain set of attributes to establish a session key, have been proposed in recent years. However, attacks on attribute-based group key exchange in current research have been considered only in stand-alone fashion. Thus these protocols may be vulnerable when run with other protocol sessions concurrently. ...

Journal: :IACR Cryptology ePrint Archive 2007
Sujing Zhou Dongdai Lin

We propose an interesting efficient member ID-based group signatures, i.e., verification of output from algorithm OPEN run by the group manager does not have to refer to a registration table (acting as certification list). The proposal is free of GM-frameability, i.e., secret key of member is not escrowed to GM, which is unique among all known member ID-based group signatures as far as we know....

Journal: :IACR Cryptology ePrint Archive 2004
Junghyun Nam Sungduk Kim Seungjoo Kim Dongho Won

Group key agreement protocols are designed to solve the fundamental problem of securely establishing a session key among a group of parties communicating over a public channel. Although a number of protocols have been proposed to solve this problem over the years, they are not well suited for a high-delay wide area network; their communication overhead is significant in terms of the number of c...

Journal: :Informatica, Lith. Acad. Sci. 2010
Yuh-Min Tseng Tsu-Yang Wu

In 2008, based on the two-party Diffie–Hellman technique, Biswas proposed a contributory group key exchange protocol called the Group-DH protocol. This contributory property is an important one of group key agreement. Unfortunately, in this paper we show that the proposed Group-DH protocol is not a contributory group key exchange protocol. Therefore, we propose an improved group key exchange pr...

Journal: :IEE Proceedings - Software 2005
C. Vidakis Martin Fleury

The complex software structures and procedures to establish multicast group key distribution are analyzed, with resulting performance timings and trial applications reported. Existing solutions for very-large scale group key distribution with a hierarchical virtual tree topology are engineered for commercial applications using a public key infrastructure and open source Java security libraries....

Journal: :I. J. Network Security 2010
Rajavelu Srinivasan V. Vaidehi Rajavelu Rajaraman S. Kanagaraj R. Chidambaram Kalimuthu R. Dharmaraj

This paper proposes a scheme to provide security to dynamic multicast VoIP systems efficiently. Security is usually provided by encrypting the media packets sent from a user to other users with the help of a shared key called the session encryption key. The most time consuming process in a dynamic multicast VoIP environment is the group key management. Whenever there is a change in the group me...

Journal: :I. J. Network Security 2016
Fushan Wei Yun Wei Chuangui Ma

An authenticated group key exchange (AGKE) protocol allows a group of participants to establish a common session key and then provides secure group communications in collaborative and distributed applications. Recently, Wu et al. proposed an ID-based authenticated group key exchange protocol based on bilinear pairings. They claimed that their protocol can detect and identify the malicious parti...

Journal: :TIIS 2009
Sunghyuck Hong

Current group key agreement protocols (often tree-based) involve unnecessary delays because members with low-performance computer systems can join group key computation. These delays are caused by the computations needed to balance a key tree after membership changes. An alternate approach to group key generation that reduces delays is the dynamic prioritizing mechanism of filtering low perform...

Journal: :International Journal of Computer Applications 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید