搜索结果: 1-15 共查到“军队指挥学 Group Key Exchange”相关记录18条 . 查询时间(0.129 秒)
Constant-Round Group Key Exchange from the Ring-LWE Assumption
Group key exchange Ring learning with errors Post-quantum cryptography
2019/4/22
Group key-exchange protocols allow a set of N parties to agree on a shared, secret key by communicating over a public network. A number of solutions to this problem have been proposed over the years, ...
One-Round Authenticated Group Key Exchange from Isogenies
one-round authenticated group key exchange cryptographic invariant maps hard homogeneous spaces
2018/11/2
We propose two one-round authenticated group-key exchange protocols from newly employed cryptographic invariant maps (CIMs): one is secure under the quantum random oracle model and the other resists a...
We design a group key exchange protocol where most of the participants remain offline until they wish to compute the key. This is well suited to a cloud storage environment where users are often offli...
Group key exchange protocols withstanding ephemeral-key reveals
Group Key Agreement Strong Security Ephemeral Keys
2016/12/29
When a group key exchange protocol is executed, the session key is typically extracted from two types of secrets;
long-term keys (for authentication) and freshly generated (often random) values. The ...
Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings
Universally Composable Symbolic Analysis Computational Soundness Bilinear Pairings Group Key Exchange Protocol Forward Secrecy
2012/3/26
Canetti and Herzog have proposed a universally composable symbolic analysis (UCSA) of mutual authentication and key exchange protocols within universally composable security framework. It is fully aut...
Generic One Round Group Key Exchange in the Standard Model
Group Key Exchange Key Encapsulation Mechanism Key Compromise Impersonation
2009/11/18
Minimizing complexity of group key exchange (GKE) protocols is an important milestone
towards their practical deployment. An interesting approach to achieve this goal is to simplify the
design of GK...
Universally Composable Contributory Group Key Exchange
Group Key Exchange Contributiveness Universal Composition
2009/7/1
We treat the security of group key exchange (GKE) in the universal composability (UC)
framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by malicious
insiders. We def...
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
Group Key Exchange Key Compromise Impersonation Insider Attacks
2009/6/23
A key exchange protocol allows a set of parties to agree upon a secret session key over a
public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various
models c...
Scalable Protocols for Authenticated Group Key Exchange
Scalable Protocols Authenticated Group Key Exchange
2009/4/9
We consider the fundamental problem of authenticated group key exchange among
n parties within a larger and insecure public network. A number of solutions to this
problem have been proposed; however...
Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange
group key agreement authenticated key agreement provable security factoring
2009/3/26
Group key agreement protocols are designed to solve the fundamental problem of securely
establishing a session key among a group of parties communicating over a public channel.
Although a number of ...
Efficient Compilers for Authenticated Group Key Exchange
Efficient Compilers Authenticated Group Key Exchange
2009/3/10
In this paper we propose two compilers which are designed to transform a
group key exchange protocol secure against any passive adversary into an
authenticated group key exchange protocol with key c...
Modeling Insider Attacks on Group Key-Exchange Protocols
Group key exchange Insider attacks Universal composability
2009/2/10
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to
establish a common session key which can then be used to secure their future communication.
It is fair to s...
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Key Distribution Group Key Exchange Tree based GKE
2009/1/5
Task-specific groups are often formed in an ad-hoc manner within big
structures, like companies. Take the following typical scenario: A high rank manager
decides that a task force group for some pro...
Security-Focused Survey on Group Key Exchange Protocols
group key exchange protocol security survey
2008/12/29
In this paper we overview a large number of currently known group key exchange
protocols while focusing on the protocols designed for more than three participants
(for an overview of two- and three-...
Survey on Security Requirements and Models for Group Key Exchange
group key exchange security model survey analysis
2008/12/26
In this report we provide an analytical survey on security issues that are relevant
for group key exchange (GKE) protocols. We start with the description of the security
requirements that have been ...