English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21673137      Online Users : 664
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 資訊工程學系 > 期刊論文 >  Item 310904400/25337


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/25337


    Title: A Fault-tolerant Group Key Agreement Protocol Exploiting Dynamic Setting
    Authors: Cheng, Zi-Yao;Cheng, Zi-Yao;Liu, Yun;Liu, Yun;張真誠;Chang, Chin-Chen;Guo, Cheng;Guo, Cheng
    Contributors: 資訊工程學系
    Keywords: security;group key agreement;fault tolerance;dynamic setting;efficiency
    Date: 2013-01
    Issue Date: 2013-07-11 06:18:10 (UTC+0)
    Abstract: A fault-tolerant group key agreement is an essential infrastructure for Internet communication among all involved participants; it can establish a secure session key no matter how many malicious participants exit simultaneously in an effort to disrupt the key agreement process. Recently, Zhao et al. proposed an efficient fault-tolerant group key agreement protocol named efficient group key agreement that can resist denial-of-service attacks, reply attacks, man-in-middle attacks, and common modulus attacks; it can also preserve forward secrecy with lower computational cost than previous protocols. We show that it is still vulnerable to active attacks by malicious participants and modify the corresponding security weakness adaptively. Furthermore, we propose an efficient fault-tolerant group key agreement based on a binary tree structure and enhance it to a dynamic setting where participants can leave or join the group arbitrarily according to their preferences with instant session key refreshment. Additionally, our session key refreshment is based on secure key updating to protect forward/backward confidentiality and is resistant to active/passive attacks. The performance analysis shows that our proposed protocol has lower computational cost and little additional communication cost exploiting dynamic setting. Copyright © 2013 John Wiley & Sons, Ltd.
    Relation: INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, V.26 N.2 : 259–275.
    Appears in Collections:[資訊工程學系] 期刊論文

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML426View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback