supported by the Fund of the China Scholarship Council,National Natural Science Foundation of China(Grants Nos.60873260,60903210);National High Technology Research and Development Program of China(Grant No.2009AA01Z414);National Basic Research Program of China(Grant No. 2007CB311202)
Key-privacy is a notion of security that is concerned with the key anonymity in public-key en- cryption. Some popular schemes keep key-privacy, while others do not. Key-privacy has been shown to be orthogonal to data-...
supported by National Basic Research Program of China (Grant No. 2007CB807902);Knowledge Innovation Project of the Chinese Academy of Sciences (Grant No. YYYJ-1013);National Nature Science Foundation of China (Grant No. 60903210)
Ustaoglu presents a secure and efficient key exchange protocol named CMQV, based on the design rationales of HMQV and NAXOS. Compared with the latter two protocols, on one hand, CMQV achieves high performance of HMQV,...
supported by the National Basic Research Program of China (Grant No. 2007CB807902);the Knowledge Innovation Project of the Chinese Academy of Sciences (Grant No. YYYJ-1013);the National Natural Science Foundation of China (Grant No. 60903210)
Authenticated group key exchange protocols allow a group of users over a public network to establish a shared secret key for the subsequent cryptographic goals. In this paper, we extend BD-II scheme into a dynamic set...