Member Tampering Attack on Burmester-Desmedt Group Key Exchange Protocol and Its Countermeasure
With the rapid development of cloud computing and mobile networks, more and more application scenarios require a secret group key for secure communication. Group Key Exchange (GKE) protocol provides a secret group key for three or more members. Burmester and Desmedt presented an influential GKE prot...
Main Authors: | Da-Zhi Sun, Yangguang Tian |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-10-01
|
Series: | Mathematics |
Subjects: | |
Online Access: | https://www.mdpi.com/2227-7390/10/19/3685 |
Similar Items
-
Cable Capacitance Attack against the KLJN Secure Key Exchange
by: Hsien-Pu Chen, et al.
Published: (2015-10-01) -
Aye: A Trusted Forensic Method for Firmware Tampering Attacks
by: Yipeng Zhang, et al.
Published: (2023-01-01) -
ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection
by: Tahoura Mosavirik, et al.
Published: (2022-11-01) -
D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie–Hellman Key Exchange
by: Szilard Pfeiffer, et al.
Published: (2024-01-01) -
A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System
by: Mutaz Y. Melhem, et al.
Published: (2019-02-01)