Comparison of group key establishment protocols

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysing ZigBee Key Establishment Protocols

Preface This report provides a detailed documentation on the application of static program analysis to the key establishment protocols of the ZigBee wireless sensor network standard. The approach presented in this report is within the scope of the SENSORIA (Software Engineering for Service-Oriented Overlay Computers) project, and will form a preliminary version of one of the chapters in my PhD ...

متن کامل

Attribute-based group key establishment

Motivated by the problem of establishing a session key among parties based on the possession of certain credentials only, we discuss a notion of attribute-based key establishment. A number of new issues arise in this setting that are not present in the usual settings of group key establishment where unique user identities are assumed to be publicly available. After detailing the security model,...

متن کامل

Scalable Deniable Group Key Establishment

The popular Katz-Yung compiler from CRYPTO 2003 can be used to transform unauthenticated group key establishment protocols into authenticated ones. In this paper we present a modification of Katz and Yung’s construction which maintains the round complexity of their compiler, but for ‘typical’ unauthenticated group key establishments adds authentication in such a way that deniability is achieved...

متن کامل

New attacks on ISO key establishment protocols

Cheng and Comley demonstrated type flaw attacks against the key establishment mechanism 12 standardized in ISO/IEC 11770-2:1996. They also proposed enhancements to fix the security flaws in the mechanism. We show that the enhanced version proposed by Cheng and Comley is still vulnerable to type flaw attacks. As well we show that the key establishment mechanism 13 in the above standard is vulner...

متن کامل

Accelerating Key Establishment Protocols for Mobile Communication

Mobile communication is more vulnerable to security attacks such as interception and unauthorized access than xed network communication. To overcome these problems, many protocols have been proposed to provide a secure channel between a mobile station and a base station. However, the public-key based protocols are not fully utilized due to the poor computing power and the small battery capacity...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES

سال: 2017

ISSN: 1300-0632,1303-6203

DOI: 10.3906/elk-1407-213