[[abstract]]Group key agreement is an important security mechanism for distributed communications, in which it can provide a specific environment for people located at different places to contribute each one’s secret to establish a final session key over an insecure channel. Recently, Guo and Zhang proposed a new protocol that satisfied the requirements of a group key agreement in terms of a chaotic cryptosystem. However, Guo and Zhang’s protocol cannot comply with the mechanism for group key agreement even if it has a contributory nature inside, and it cannot protect the security when off-line guessing attacks occur. To overcome these drawbacks, we propose a novel, practical protocol that meets the realistic requirements of group key agreement ...
Secure and reliable group communication is an active area of research. The main issue in secure grou...
Known proposals for key establishment schemes basing on combinatorial group theory are often formul...
The A-GDH.2 and SA-GDH.2 authenticated group key agreement protocols showed to be flawed in 2001. Ev...
[[abstract]]A key agreement protocol is used to derive a shared secure session key by two or more pa...
To accomplish secure group communication, it is essential to share a unique cryptographic key among ...
Contributory group key agreement protocols generate group keys based on contributions of all group m...
Contributory group key agreement protocols generate group keys based on contributions of all group m...
Many applications in distributed computing systems, such as IP telephony, teleconferencing, collabor...
This paper introduces a new family of protocols ad-dressing collaborative group key agreement for se...
The security is a critical issue for business purposes. For example, the cloud meeting must consider...
[[abstract]]A fault-tolerant group key agreement is an essential infrastructure for Internet communi...
AbstractMany group-oriented applications in distributed systems, such as teleconferencing and cooper...
Chaotic maps have been applied in the design of authenticated key agreement protocols, which allow c...
The A-GDH.2 and SA-GDH.2 authenticated group key agreement protocols were shown to be flawed at CSFW...
Klein et al. proposed a key exchange protocol using chaos synchronization. The first protocol compri...
Secure and reliable group communication is an active area of research. The main issue in secure grou...
Known proposals for key establishment schemes basing on combinatorial group theory are often formul...
The A-GDH.2 and SA-GDH.2 authenticated group key agreement protocols showed to be flawed in 2001. Ev...
[[abstract]]A key agreement protocol is used to derive a shared secure session key by two or more pa...
To accomplish secure group communication, it is essential to share a unique cryptographic key among ...
Contributory group key agreement protocols generate group keys based on contributions of all group m...
Contributory group key agreement protocols generate group keys based on contributions of all group m...
Many applications in distributed computing systems, such as IP telephony, teleconferencing, collabor...
This paper introduces a new family of protocols ad-dressing collaborative group key agreement for se...
The security is a critical issue for business purposes. For example, the cloud meeting must consider...
[[abstract]]A fault-tolerant group key agreement is an essential infrastructure for Internet communi...
AbstractMany group-oriented applications in distributed systems, such as teleconferencing and cooper...
Chaotic maps have been applied in the design of authenticated key agreement protocols, which allow c...
The A-GDH.2 and SA-GDH.2 authenticated group key agreement protocols were shown to be flawed at CSFW...
Klein et al. proposed a key exchange protocol using chaos synchronization. The first protocol compri...
Secure and reliable group communication is an active area of research. The main issue in secure grou...
Known proposals for key establishment schemes basing on combinatorial group theory are often formul...
The A-GDH.2 and SA-GDH.2 authenticated group key agreement protocols showed to be flawed in 2001. Ev...