2011 7th International Conference on Next Generation Web Services Practices 2011
DOI: 10.1109/nwesp.2011.6088179
|View full text |Cite
|
Sign up to set email alerts
|

Remarks and countermeasures on a cryptoanalysis of a secure multicast protocol

Abstract: In this work we give some remarks and countermeasures in order to show that the cryptoanalysis presented in [11] on the secure multicast protocol introduced in [8] does not affect significantly its security.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…We recall here the main vulnerability of the original key refreshment, since the improved version presented in [7] does not modify substantially the scheme. Let us consider a legal member h which receives the key refreshment parameters (g, m and u) in a regular way.…”
Section: Vulnerability Of the Key Refreshment Schemementioning
confidence: 99%
See 4 more Smart Citations
“…We recall here the main vulnerability of the original key refreshment, since the improved version presented in [7] does not modify substantially the scheme. Let us consider a legal member h which receives the key refreshment parameters (g, m and u) in a regular way.…”
Section: Vulnerability Of the Key Refreshment Schemementioning
confidence: 99%
“…As a countermeasure, Antequera and López-Ramos have proposed in [7] a new scheme based on the Chinese Remainder Theorem. It is as follows.…”
Section: Authentication Protocolmentioning
confidence: 99%
See 3 more Smart Citations