Improvement of the Efficient Secret Broadcast Scheme
スポンサーリンク
概要
- 論文の詳細を見る
In 2009, Jeong et al. proposed a secure binding encryption scheme and an efficient secret broadcast scheme. This paper points out that the schemes have some errors and cannot operate correctly, contrary to their claims. In addition, this paper also proposes improvements of Jeong et al.s scheme that can withstand the proposed attacks.
- (社)電子情報通信学会の論文
- 2010-12-01
著者
-
Yoo Kee-young
School Of Electrical Engineering And Computer Science Kyungpook National University
-
Yoo Kee‐young
Kyungpook National Univ. Daegu Kor
-
Yoon Eun‐jun
Kyungpook National Univ. Daegu Kor
-
Yoon Eun-jun
School Of Electrical Engineering And Computer Science Kyungpook National University
-
Khan Muhammad
Center Of Excellence In Information Assurance (coeia) King Saud University
-
Yoo Kee-young
School Of Computer Science And Engineering College Of It Engineering Kyungpook National University
-
Yoon Eun-jun
School Of Computer Engineering Kyungil University
関連論文
- An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
- Comments on Modified User Friendly Remote Authentication Scheme with Smart Cards(Fundamental Theories for Communications)
- Cryptanalysis of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks(Fundamental Theories for Communications)
- Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing
- Improvement of the Efficient Secret Broadcast Scheme
- A Biometric Authenticated Key Agreement Protocol for Secure Token
- A Robust Security Mechanism for Mobile Commerce Transactions
- Off-Line Keyword Guessing Attacks on Searchable Encryption with Keyword-Recoverability
- Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System
- Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function
- On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme
- Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications