Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
From MaRDI portal
Publication:3617516
DOI10.1007/978-3-642-00468-1_7zbMath1227.94046OpenAlexW1520096918MaRDI QIDQ3617516
M. Choudary Gorantla, Juan Manuel González Nieto, Colin A. Boyd
Publication date: 24 March 2009
Published in: Public Key Cryptography – PKC 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-00468-1_7
Related Items (12)
A strongly secure identity-based authenticated group key exchange protocol ⋮ An ID-based authenticated dynamic group key agreement with optimal round ⋮ One-Round Attribute-Based Key Exchange in the Multi-Party Setting ⋮ Provably secure one-round identity-based authenticated asymmetric group key agreement protocol ⋮ Group key agreement for secure group communication in dynamic peer systems ⋮ Authenticated Group Key Agreement Protocol Without Pairing ⋮ Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards ⋮ On the Minimum Communication Effort for Secure Group Key Exchange ⋮ Group key exchange protocols from supersingular isogenies ⋮ Signed (group) Diffie-Hellman key exchange with tight security ⋮ Analysis and enhancement of a password authentication and update scheme based on elliptic curve cryptography ⋮ A conference key distribution system
Uses Software
This page was built for publication: Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols