a security weakness in abdalla et al:在abdalla等人的安全弱点.’s generic construction of a group key exchange protocol.pdfVIP
- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
a security weakness in abdalla et al:在abdalla等人的安全弱点.’s generic construction of a group key exchange protocol
Information Sciences 181 (2011) 234–238
Contents lists available at ScienceDirect
Information Sciences
journal homepage: www.else /locate/ins
A security weakness in Abdalla et al.’s generic construction
of a group key exchange protocol
Junghyun Nam a,⇑, Juryon Paik b, Dongho Won b
a Department of Computer Science, Konkuk University, 322 Danwol-dong, Chungju-si, Chungcheongbuk-do 380-701, Republic of Korea
b School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-dong, Suwon-si, Gyeonggi-do 440-746, Republic of Korea
a r t i c l e i n f o a b s t r a c t
Article history: In TCC ’07, Abdalla et al. presented a protocol compiler that transforms any authenticated
Received 22 April 2010 2-party key exchange protocol into an authenticated group key exchange (GKE) protocol.
Received in revised form 8 September 2010 Abdalla et al.’s compiler is certainly elegant in its genericness, symmetry, simplicity and
Accepted 9 September 2010
efficiency. However, this compiler is not as secure as claimed. Under a reasonable assump-
tion, the GKE protocol constructed by the compiler (from a 2-party protocol) fails to
achieve implicit key authentication. We here reveal this security problem with the compiler
Keywords: and show how to address it.
Cryptography
2010 Elsevier Inc. All rights reserved.
Group
您可能关注的文档
- a privilege-based visual secret sharing model:一种基于特权的视觉秘密共享模型.pdf
- a propensity score adjustment method for regression models with nonignorable missing covariates:一个具有不可忽略缺失的协变量回归模型校正倾向评分方法.pdf
- a propensity-matched comparison of perioperative complications and of chronic kidney disease between robot-assisted laparoscopic partial nephrectomy and radiofrequency ablative therapy:一个比较匹配的围手术期并发症和慢性肾脏疾病之间的机器人辅助腹腔镜肾部分切除术和射频消融治疗的倾向.pdf
- a promoting effect of dilution of pd sites due to gold surface segregation under reaction conditions on supported pd–au catalysts for the selective hydrogenation of 1,5-cyclooctadiene:一种促进pd网站由于黄金表面偏析反应条件对负载型钯–金催化剂1,5-环辛二烯选择性加氢的稀释效应.pdf
- a proposal of all-wavelength optical amplifiers:全光波长光放大器的一个建议.pdf
- a probabilistic security assessment approach to power systems with integrated wind resources:综合风电系统的电力系统概率安全评估方法.pdf
- a proposal of a cryptography algorithm with techniques of error correction:一种用纠错技术实现的密码算法.pdf
- a prospective 1-year study of postural tachycardia and the relationship to non-postural versus orthostatic symptoms:前瞻性体位性心动过速一年的研究和非体位与体位性症状的关系.pdf
- a proposed model for data warehouse etl processes:模型数据仓库etl过程.pdf
- a prospective analysis of the presentation and management of penile fracture at the lagos state university teaching hospital (lasuth), ikeja, lagos, nigeria:在拉各斯州立大学教学医院阴茎折断的表示和管理的前瞻性分析(lasuth),伊凯贾,拉各斯,尼日利亚.pdf
- a self-referencing biosensor for real-time monitoring of physiological atp transport in plant systems:一种植物系统中生理生化转运实时监测的自参考生物传感器.pdf
- a self-strain feedback tuning-fork-shaped ionic polymer metal composite clamping actuator with soft matter elasticity-detecting capability for biomedical applications:一种具有软质弹性的离子型离子聚合物复合材料在生物医学领域的应用.pdf
- a self-pairing map and its applications to cryptography:一种自配对映射及其在密码学中的应用.pdf
- a semantic framework for the abstract model checking of tccp programs:抽象的模型检查程序的语义框架蛋白.pdf
- a semi-automated 3-d annotation method for breast ultrasound imaging system development and feasibility study on phantoms:乳腺超声成像系统的半自动三维注注方法及假体的可行性研究.pdf
- a semidefinite optimization-based approach for global optimization of multi-row facility layout:一个半正定优化为基础的多行设备布局的全局优化方法.pdf
- a self-tuning load frequency control strategy for microgrids human brain emotional learning:自整定负荷频率控制策略的微电网的人类大脑情感学习.pdf
- a semi-recursion for the number of involutions in special orthogonal groups over finite fields:半递归在特殊正交群的有限域上的对合的数量.pdf
- a semi-preemptive priority scheduling discipline performance analysis:一种半抢占式优先级调度的学科性能分析.pdf
- a sequential elimination algorithm for computing bounds on the clique number of a graph:一个图的团数计算界的顺序消去算法.pdf
原创力文档


文档评论(0)