Computer Science – Cryptography and Security
Scientific paper
2010-08-06
Computer Science
Cryptography and Security
Scientific paper
In AFRICACRYPT 2010, Abdalla et al. first proposed a slight modification to
the computations steps of the BD protocol, called mBD+P. Then they extended
mBD+P protocol into mBD+S protocol. In this paper, we show that both of mBD+P
and mBD+S protocols are vulnerable to malicious insiders attack. Further, we
propose a simple countermeasure against this attack.
Cheng Qingfeng
Ma Chuangui
No associations
LandOfFree
Security Weakness of Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Security Weakness of Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security Weakness of Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-231211