期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Exploring Application Layer Protocol Relationships in SoftSwitch
1
作者 Zhu Xiaomin Liao Jianxin +1 位作者 Chen Junliang Li Tonghong 《China Communications》 SCIE CSCD 2009年第4期155-167,共13页
Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid mu... Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid much attention to before.On the basis of a well known protocol relationship named protocol conversion, three novel protocol relationships including protocol collaboration relationship, protocol cooperation relationship and protocol independent relationship are presented, so that protocol relationships are classified into four types.According to the functionality and purpose of each protocol, main protocols related to softswitch are divided into five groups.As to protocol conversion in softswitch, information flow trail(IFT) is utilized to facilitate problem solving.A decision rule for protocol conversion mode is proposed to guide how to choose between direct conversion and indirect conversion.A property of protocol relationships in softswitch is induced from all kinds of service scenarios of softswitch.This property summarizes protocol relationships within each protocol group or between two specific protocol groups.A merit of protocol grouping together with classification of protocol relationship is also presented.The effort of this paper pushes the protocol engineering to go ahead. 展开更多
关键词 protocol relationship protocol grouping SOFTSWITCH information flow trail
在线阅读 下载PDF
Security Analysis of Broadcaster Group Key Exchange Protocols
2
作者 LI Li ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1577-1580,共4页
Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of pr... Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper. 展开更多
关键词 group key exchange protocol broadcaster group protocols dynamic security
在线阅读 下载PDF
Universally Composable Symbolic Analysis of Group Key Exchange Protocol
3
作者 张子剑 祝烈煌 廖乐健 《China Communications》 SCIE CSCD 2011年第2期59-65,共7页
Canetti and Herzog have already proposed universally composable symbolic analysis(UCSA) to analyze mutual authentication and key exchange protocols. However,they do not analyze group key exchange protocol. Therefore,t... Canetti and Herzog have already proposed universally composable symbolic analysis(UCSA) to analyze mutual authentication and key exchange protocols. However,they do not analyze group key exchange protocol. Therefore,this paper explores an approach to analyze group key exchange protocols,which realize automation and guarantee the soundness of cryptography. Considered that there exist many kinds of group key exchange protocols and the participants’ number of each protocol is arbitrary. So this paper takes the case of Burmester-Desmedt(BD) protocol with three participants against passive adversary(3-BD-Passive) . In a nutshell,our works lay the root for analyzing group key exchange protocols automatically without sacrificing soundness of cryptography. 展开更多
关键词 universally composable symbolic analysis universally composable mapping algorithm burmester-desmedt protocol group key exchange protocol
在线阅读 下载PDF
Authenticated Group Key Agreement Protocol Based on Twist Conjugacy Problem in Near-Rings
4
作者 Devarasan Ezhilmaran Venkatesan Muthukumaran 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第6期472-476,共5页
Nowadays some promising authenticated group key agreement protocols are constructed on braid groups, dynamic groups, pairings and bilinear pairings. Hence the non-abelian structure has attracted cryptographers to cons... Nowadays some promising authenticated group key agreement protocols are constructed on braid groups, dynamic groups, pairings and bilinear pairings. Hence the non-abelian structure has attracted cryptographers to construct public-key cryptographic protocols. In this article, we propose a new authenticated group key agreement protocol which works in non-abelian near-rings. We have proved that our protocol meets the security attributes under the assumption that the twist conjugacy search problem(TCSP) is hard in near-ring. 展开更多
关键词 group key agreement protocol NEAR-RINGS twist conjugacy search problem
原文传递
A novel approach to authenticated group key transfer protocol based on AG codes
5
作者 Yuan Dezhai Peng Xingyi +1 位作者 Liu Ting Cui Zhe 《High Technology Letters》 EI CAS 2019年第2期129-136,共8页
Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to... Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security. 展开更多
关键词 group key transfer protocol erasure code AG codes non-repeatability CONFIDENTIALITY AUTHENTICATION
在线阅读 下载PDF
Group cooperative midcourse guidance law design considering time-to-go
6
作者 ZHANG Ruitao FANG Yangwang +2 位作者 CHEN Zhan GUO Hang FU Wenxing 《Journal of Systems Engineering and Electronics》 2025年第3期835-853,共19页
To solve the problem of providing the best initial situation for terminal guidance when multiple missiles intercept multiple targets,a group cooperative midcourse guidance law(GCMGL)considering time-to-go is proposed.... To solve the problem of providing the best initial situation for terminal guidance when multiple missiles intercept multiple targets,a group cooperative midcourse guidance law(GCMGL)considering time-to-go is proposed.Firstly,a threedimensional(3D)guidance model is established and a cooperative trajectory shaping guidance law is given.Secondly,for estimating the unknown target maneuvering acceleration,an adaptive disturbance observer(ADO)is designed,combining finitetime theory with a radial basis function(RBF)neural network,and the convergence of the estimation error is proven using Lyapunov stability theory.Then,to ensure time-to-go cooperation among missiles within the same group and across different groups,the group consensus protocols of virtual collision point mean and the inter-group cooperative consensus protocol are designed respectively.Based on the group consensus protocols,the virtual collision point cooperative guidance law is given,and the finite-time convergence is proved by Lyapunov stability theory.Simultaneously,combined with trajectory shaping guidance law,virtual collision point cooperative guidance law and the intergroup cooperative consensus protocol,the design of GCMGL considering time-to-go is given.Finally,numerical simulation results show the effectiveness and the superiority of the proposed GCMGL. 展开更多
关键词 cooperative midcourse guidance virtual collision point TIME-TO-GO finite-time theory group consensus protocol
在线阅读 下载PDF
An Improved ID-Based Group Key Agreement Protocol 被引量:1
7
作者 Kangwen Hu Jingfeng Xue +2 位作者 Changzhen Hu Rui Ma Zhiqiang Li 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第5期421-428,共8页
ID-based constant-round group key agreement protocols are efficient in both computation and communication, but previous protocols did not provide valid message authentication. An improvement based on attack analysis i... ID-based constant-round group key agreement protocols are efficient in both computation and communication, but previous protocols did not provide valid message authentication. An improvement based on attack analysis is proposed in this paper. The improved method takes full advantage of the data transmitted at various stages of the protocol. By guaranteeing the freshness of authentication messages, the authenticity of the generator of authentication messages, and the completeness of the authenticator, the improved protocol can resist various passive and active attacks. The forward secrecy of the improved protocol is proved under a Katz-Yung (KY) model. Compared with existing methods, the improved protocol is more effective and applicable. 展开更多
关键词 group key agreement protocol ID forward secrecy nonsuper-singular elliptic curve
原文传递
A dynamic,secure,and efficient group key agreement protocol 被引量:1
8
作者 ZHENG Shihui WANG Shaohui ZHANG Guoyan 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2007年第2期182-185,共4页
The key challenge of dynamic peer communication is how to realize secure and efficient group key manage-ment.A two rounds key agreement protocol for dynamic peer group(DPG)is proposed in this paper.The protocol,which ... The key challenge of dynamic peer communication is how to realize secure and efficient group key manage-ment.A two rounds key agreement protocol for dynamic peer group(DPG)is proposed in this paper.The protocol,which was obtained by combining the ElGamal encryption scheme with the ElGamal signature scheme,is efficient and simple.The protocol is proven secure against passive attack by using indistinguishable method.Moreover,both perfect forward secrecy(PFS)and key independence(KI)were achieved.Because the protocol is based on the broadcast channel,it is also suitable for key agreement in wireless communications,especially in ad-hoc networks. 展开更多
关键词 group key agreement protocol dynamic peer group ElGamal encryption ElGamal signature
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部