期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Provable Efficient Certificateless Group Key Exchange Protocol 被引量:8
1
作者 CAO Chunjie MA Jianfeng MOON Sangjae 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期41-45,共5页
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present ... Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol. 展开更多
关键词 group key exchange certificateless public key cryptography provable security bilinear pairings
下载PDF
Security Analysis of Broadcaster Group Key Exchange Protocols
2
作者 LI Li ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1577-1580,共4页
Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of pr... Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper. 展开更多
关键词 group key exchange protocol broadcaster group protocols dynamic security
下载PDF
Role of Civic Groups in International Cultural Exchange in France
3
作者 张胜军 Ma Jiatai 《International Understanding》 2016年第4期9-13,共5页
Civic groups refer to various organizational forms and their networks spontaneously established by citizens from all walks of society and to some extent they are usually of non-profit,nongovernmental,self-governance,o... Civic groups refer to various organizational forms and their networks spontaneously established by citizens from all walks of society and to some extent they are usually of non-profit,nongovernmental,self-governance,organizational and voluntary features.1 The words'civic groups'were of the same origin with 展开更多
关键词 In Role of Civic groups in International Cultural exchange in France
下载PDF
Scalable protocol for cross-domain group password-based authenticated key exchange 被引量:2
4
作者 Cong GUO Zijian ZHANG Liehuang ZHU Yu-an TAN Zhen YANG 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第1期157-169,共13页
Cross-domain password-based authenticated key exchange (PAKE) protocols have been studied for many years. However, these protocols are mainly focusing on multi-participant within a single domain in an open network e... Cross-domain password-based authenticated key exchange (PAKE) protocols have been studied for many years. However, these protocols are mainly focusing on multi-participant within a single domain in an open network environment. This paper proposes a novel approach for designing a cross-domain group PAKE protocol, that primarily handles with the setting of multi-participant in the multi- domain. Moreover, our protocol is proved secure against active adversary in the Real-or-Random (ROR) model. In our protocol, no interaction occurs between any two domain authentication servers. They are regarded as ephemeral certificate authorities (CAs) to certify key materials that participants might subsequently use to exchange and agree on group session key. We further justify the computational complexity and measure the average computation time of our protocol. To the best of our knowledge, this is the first work to analyze and discuss a provably secure multi-participant cross-domain group PAKE protocol. 展开更多
关键词 cross-domain password-based authenticated key exchange (PAKE) group key exchange Real-Or-Random (ROR) model provable secure
原文传递
通用可组合符号化分析群组密钥协商协议(英文)
5
作者 张子剑 祝烈煌 廖乐健 《China Communications》 SCIE CSCD 2011年第2期59-65,共7页
Canetti and Herzog have already proposed universally composable symbolic analysis(UCSA) to analyze mutual authentication and key exchange protocols. However,they do not analyze group key exchange protocol. Therefore,t... Canetti and Herzog have already proposed universally composable symbolic analysis(UCSA) to analyze mutual authentication and key exchange protocols. However,they do not analyze group key exchange protocol. Therefore,this paper explores an approach to analyze group key exchange protocols,which realize automation and guarantee the soundness of cryptography. Considered that there exist many kinds of group key exchange protocols and the participants’ number of each protocol is arbitrary. So this paper takes the case of Burmester-Desmedt(BD) protocol with three participants against passive adversary(3-BD-Passive) . In a nutshell,our works lay the root for analyzing group key exchange protocols automatically without sacrificing soundness of cryptography. 展开更多
关键词 universally composable symbolic analysis universally composable mapping algorithm burmester-desmedt protocol group key exchange protocol
下载PDF
A Dynamic ID-Based Authenticated Group Key Exchange Protocol without Pairings
6
作者 XIE Liyun HE Mingxing 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期255-260,共6页
So far, most of the proposed group key exchange (GKE) protocols do not consider the attack when the adversary reveals the parties' ephemeral private keys without their long-term private keys, so these GKE protocols... So far, most of the proposed group key exchange (GKE) protocols do not consider the attack when the adversary reveals the parties' ephemeral private keys without their long-term private keys, so these GKE protocols are insecure on this attack. In this paper, for resisting above attack, we propose a dynamic authenticated group key exchange (AGKE) protocol in the ID-based setting. Different from previous ID-based protocols, our protocol does not utilize bilinear pairings, which makes it more efficient. At last, we analyze the security of the protocol in the cCK (enhanced Canetti-Krawczyk) security model. 展开更多
关键词 group key exchange eCK security model without pairings
原文传递
The Dominant Trend Towards Sinicization in Early Tang Civilization-A Discussion of the Influence on Tang Poetry of Cultural Exchanges Between Various Ethnic Groups
7
作者 葛晓音 《Social Sciences in China》 1999年第2期155-161,192,共8页
关键词 The Dominant Trend Towards Sinicization in Early Tang Civilization-A Discussion of the Influence on Tang Poetry of Cultural exchanges Between Various Ethnic groups
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部