国产bbaaaaa片,成年美女黄网站色视频免费,成年黄大片,а天堂中文最新一区二区三区,成人精品视频一区二区三区尤物

首頁> 外文期刊>IEICE Transactions on fundamentals of electronics, communications & computer sciences >Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks
【24h】

Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks

機譯:基于ID的可經(jīng)受內(nèi)部攻擊的身份驗證組密鑰協(xié)商協(xié)議的注釋

獲取原文
獲取原文并翻譯 | 示例

摘要

In PKC 2004. Choi ct al. proposed an ID-based authenticated group key agreement (AGKA) protocol using bilinear pairings. Unfortunately, their protocol suffered from an impersonation attack and an insider colluding attack. In 2008, Choi et al. presented an improvement to resist insider attacks. In their modified protocol, they used an ID-based signature scheme on transcripts for binding them in a session to prevent replay of transcripts. In particular, they smartly used the batch verification technique to reduce the computational cost. In this paper, we first show that Choi et al.'s modilied AGKA protocol still suffers from an insider colluding attack. Then, we prove that the batch verification of the adopted ID-based signature scheme in their modified protocol suffers from a forgery attack.
機譯:在PKC 2004中。提出了一種使用雙線性對的基于ID的認證組密鑰協(xié)議(AGKA)協(xié)議。不幸的是,他們的協(xié)議遭受了模擬攻擊和內(nèi)部人員勾結攻擊。在2008年,Choi等人。提出了一種抵抗內(nèi)部攻擊的改進方法。在他們經(jīng)過修改的協(xié)議中,他們對成績單使用了基于ID的簽名方案,以便在會話中將其綁定,以防止成績單重播。特別是,他們巧妙地使用了批驗證技術來降低計算成本。在本文中,我們首先表明Choi等人的改進型AGKA協(xié)議仍然遭受內(nèi)部人員勾結攻擊。然后,我們證明了在其修改后的協(xié)議中采用的基于ID的簽名方案的批量驗證遭受了偽造攻擊。

著錄項

相似文獻

  • 外文文獻
  • 中文文獻
  • 專利
獲取原文

客服郵箱:kefu@zhangqiaokeyan.com

京公網(wǎng)安備:11010802029741號 ICP備案號:京ICP備15016152號-6 六維聯(lián)合信息科技 (北京) 有限公司?版權所有
  • 客服微信

  • 服務號