Cryptanalysis of Two Group Key Management Protocols for Secure Multicast.
Wen Tao ZhuPublished in: CANS (2005)
Keyphrases
- key distribution
- secret key
- cryptographic protocols
- key establishment
- ip multicast
- security protocols
- authentication protocol
- group communication
- key management scheme
- key exchange
- key management
- key agreement protocol
- block cipher
- multi party
- signature scheme
- application level
- routing algorithm
- security services
- smart card
- wireless ad hoc networks
- overlay network
- multicast routing
- diffie hellman
- wireless networks
- security analysis
- security properties
- secure multiparty computation
- public key
- homomorphic encryption
- mutual authentication
- privacy preserving
- network coding
- ad hoc networks
- secure communication
- hash functions
- security requirements
- security mechanisms
- wireless sensor networks
- end to end
- multicast routing protocol
- public key cryptosystems
- electronic voting
- trusted third party
- scatter search
- standard model
- encryption scheme
- fault tolerance
- wireless medium
- sensor networks