Securing group key exchange against strong corruptions and key registration attacks
From MaRDI portal
Publication:1001678
DOI10.1504/IJACT.2008.021083zbMath1154.94380OpenAlexW2171800211MaRDI QIDQ1001678
Mark Manulis, Emmanuel Bresson
Publication date: 24 February 2009
Published in: International Journal of Applied Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1504/ijact.2008.021083
cryptographysecuritymutual authenticationauthenticated group Key exchangecontributivenessephemeral secretsGKE protocolsinsider attacksKey registrationmalicious insidersstrong corruptionsTDH1tree Diffie-Hellman
Related Items (6)
An ID-based authenticated dynamic group key agreement with optimal round ⋮ Group key agreement for secure group communication in dynamic peer systems ⋮ On the Minimum Communication Effort for Secure Group Key Exchange ⋮ Group key exchange protocols from supersingular isogenies ⋮ Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness ⋮ A conference key distribution system
Uses Software
This page was built for publication: Securing group key exchange against strong corruptions and key registration attacks