Strong ID-Based Key Distribution
スポンサーリンク
概要
- 論文の詳細を見る
Several ID-based key distribution schemes can be used to realize secure broadcasting systems. Unfortunately, none of the proposed schemes provide both security against long-term key reveal attacks and security against session state reveal attacks. In this letter, we suggest an ID-based key distribution scheme secure against long-term key reveal attacks and session state reveal attacks.
- (社)電子情報通信学会の論文
- 2008-01-01
著者
-
Lee Dong
Graduate School of Information Management & Security, CIST, Korea University
-
KWON Jeong
Graduate School of Information Security CIST, Korea university
-
Kwon Jeong
Graduate School Of Information Security Cist Korea University
-
Lee Dong
Etri (electronics And Telecommunications Research Institute)
-
Kwon Jeong
Information Security Group Samsung Sds
-
Lee Dong
Graduate School Of Information & Communication Ajou University
-
JEONG Ik
ETRI (Electronics and Telecommunications Research Institute)
-
Jeong Ik
Graduate School Of Information Management & Security Cist Korea University
関連論文
- RFID tag search protocol preserving privacy of mobile reader holders
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme
- Stronger Chikazawa-Yamagishi ID-Based Key Distribution
- Searchable Encryption with Keyword-Recoverability
- SSR (Smart Sleep Recognizer): Making Decision Based on Probability of User's Intension (日韓合同ワークショップ 1st Korea-Japan Joint Workshop on Ubiquitous Computing and Networking Systems (ubiCNS 2005))
- Change of Rotated Cube Texture through Multi-processing in 3% Si-steels
- Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
- Analysis of Revocable-iff-Linked Ring Signature Scheme
- Strong ID-Based Key Distribution
- Three-Round Smart Card-Based Key Exchange Scheme(Fundamental Theories for Communications)
- On the Strong Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing(Information Security)
- Ultimate Longitudinal Strength-Based Safety and Reliability Assessment of a Ship′s Hull Girder〔付 討論〕
- Incompletely Condensed Silsesquioxanes : Formation and Reactivity
- A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations
- Scalable Privacy-Preserving t-Repetition Protocol with Distributed Medical Data
- Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages