浏览全部资源
扫码关注微信
1. 华中科技大学计算机科学与技术学院信息安全实验室
2. 湖北民族学院信息工程系
纸质出版日期:2009
移动端阅览
徐鹏, 崔国华, 郑明辉. 高效的抗阻断攻击的非认证组密钥协商方案[J]. 通信学报, 2009,30(10):75-80.
XU Peng1, CUI Guo-hua1, ZHENG Ming-hui2. Efficiently non-authenticated group key management protocol withstand interruption attack[J]. 2009, 30(10): 75-80.
徐鹏, 崔国华, 郑明辉. 高效的抗阻断攻击的非认证组密钥协商方案[J]. 通信学报, 2009,30(10):75-80. DOI:
XU Peng1, CUI Guo-hua1, ZHENG Ming-hui2. Efficiently non-authenticated group key management protocol withstand interruption attack[J]. 2009, 30(10): 75-80. DOI:
针对BD
3
协议存在密钥阻断攻击的缺点
采用双线性映射技术给出了解决方案
并且该方案在被动攻击下的安全性证明具有最"紧"的归约。通过分析和仿真对比已有的同类解决方案可以看出:改进方案具有更优的效率
特别是其消息传输量可以仅约为已有方案的0.14倍。另外
在仿真过程中
简要地说明了实用中双线性映射的实现方法
特别是参数的选取及其安全性意义。
To overcome the fault that the interruption attack from internal participation of BD
protocol
a new scheme was constructed by applying the bilinear map and had the provable security with tight reduction. By analyzing and simulating
compared with another scheme
it was obvious that the new scheme was more efficiently than that one. Especially in the quantity of message for communication
it could be approximately 0.14 multiple of that one. On the other hand
the process of simulation simply explaines the method how to carry out the bilinear map
especially how to choose the parameters of it and its signification in the security.
0
浏览量
103
下载量
CSCD
关联资源
相关文章
相关作者
相关机构