Efficiently non-authenticated group key management protocol withstand interruption attack
To overcome the fault that the interruption attack from internal participation of BD<sub>3</sub> protocol, a new scheme was constructed by applying the bilinear map and had the provable security with tight reduction. By analyzing and simulating, compared with another scheme, it was obvio...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2009-01-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/74650176/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|