Group key exchange protocols withstanding ephemeral‐key reveals
Author:
Affiliation:
1. MACIMTEUniversidad Rey Juan CarlosC/Tulipán, s/n, 28933 MóstolesSpain
2. Departamento de MatemáticasResearch Institute of Applied Sciences in Cybersecurity (RIASC), Universidad de LeónCampus de Vegazana s/n, 24071 LeónSpain
Funder
Ministerio de Economía y Competitividad
Publisher
Institution of Engineering and Technology (IET)
Subject
Computer Networks and Communications,Information Systems,Software
Link
https://onlinelibrary.wiley.com/doi/pdf/10.1049/iet-ifs.2017.0131
Reference45 articles.
1. Cremers C.J.F.: ‘Session‐state reveal is stronger than ephemeral key reveal: attacking the NAXOS authenticated key exchange protocol’.Applied Cryptography and Network Security Seventh Int. Conf. ACNS 2009 Proc. Paris‐Rocquencourt France 2–5 June2009(LNCS 5536) pp.20–33
2. Bresson E. Manulis M.: ‘Securing group key exchange against strong corruptions’.Proc. 2008 ACM Symp. Information Computer and Communications Security ASIACCS 2008 Tokyo Japan 18–20 March2008 pp.249–260
3. Brecher T. Bresson E. Manulis M.: ‘Fully robust tree‐Diffie–Hellman group key exchange’.Cryptology and Network Security Eighth Int. Conf. CANS 2009 Proc. Kanazawa Japan 12–14 December2009(LNCS 5888) pp.478–497
4. Gorantla M.C. Boyd C. González Nieto J.M.et al: ‘Generic one round group key exchange in the standard model’.Information Security and Cryptology – ICISC 2009 12th Int. Conf. Seoul Korea 2–4 December2009(LNCS 5984) pp.1–15
5. Gorantla M.C. Boyd C. Nieto J.M.G.: ‘Modeling key compromise impersonation attacks on group key exchange protocols’.Public Key Cryptography – PKC 2009(LNCS 5443) pp.105–123
Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Blockchain‐based indoor location paging and answering service with truncated‐geo‐indistinguishability;IET Blockchain;2021-10-16
2. RV-TEE: secure cryptographic protocol execution based on runtime verification;Journal of Computer Virology and Hacking Techniques;2021-07-05
3. Cryptanalysis of a Group Key Establishment Protocol;Symmetry;2021-02-17
4. Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification;Proceedings of the 6th International Conference on Information Systems Security and Privacy;2020
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3