2008
DOI: 10.1007/s10207-008-0062-1
|View full text |Cite
|
Sign up to set email alerts
|

Conference key agreement protocol with non-interactive fault-tolerance over broadcast network

Abstract: Most conventional conference key agreement protocols have not been concerned with a practical situation. There may exist some malicious conferees who attempt to block conference initiation for some purposes, e.g. commercial, political or military benefit. Instances where conference must be launched immediately due to emergency, efficient detection of malicious behavior would be needed. Recently, Tzeng (IEEE Trans. Comput. 51(4):373-379, 2002) proposed a fault-tolerant conference key agreement protocol to addre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
1

Year Published

2010
2010
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 27 publications
0
11
0
1
Order By: Relevance
“…Since the permutation is bijective, the above three protocols sustain replay, chosen plaintext and Phishing attacks. Using the result (Proposition 1 of [5]), we can state : For any message m , a client sends m3 to server is unique in the protocols 1,2 and 3. On following this, any malicious customer who cheats on honest customers by attempting to access these protocols will not gain.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Since the permutation is bijective, the above three protocols sustain replay, chosen plaintext and Phishing attacks. Using the result (Proposition 1 of [5]), we can state : For any message m , a client sends m3 to server is unique in the protocols 1,2 and 3. On following this, any malicious customer who cheats on honest customers by attempting to access these protocols will not gain.…”
Section: Security Analysismentioning
confidence: 99%
“…During the communication, a permutation technique (cubing a random number w.r.to a prime p = 2 mod 3) is used between client and server ends in order to avoid reply attack. The defi ned permutation: r r r 3 3 " = mod p (where p = 2 mod 3) is a bijective map [5] employed as a crucial role in the proposed EAPs. There are three authentication protocols proposed below that will fulfi ll CAAA issues.…”
Section: Descriptionmentioning
confidence: 99%
“…를 분배하는 많은 연구들이 이루어졌다 [5][6][7][8][9][10] . 그 중에 서도 Harn과 Lin은 Shamir의 비밀 공유 방식을 기반 으로 그룹 세션키를 분배하는 프로토콜을 제안하였다 [11] .…”
Section: 최근에는 한 그룹 내의 멤버들에게 공통의 세션키unclassified
“…To overcome this drawback, some fault-tolerant group key agreement protocols [12][13][14][15]17,18] were developed. In a fault-tolerant group key agreement protocol, all malicious participants are excluded from the set of participants before session key computation and cannot disrupt the key agreement process.…”
Section: Introductionmentioning
confidence: 99%