Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme.
Junghyun NamSeungjoo KimDongho WonPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2006)
Keyphrases
- key distribution
- key management
- fault tolerant
- group communication
- diffie hellman
- signature scheme
- secret key
- signcryption scheme
- key management scheme
- elliptic curve
- authentication protocol
- private key
- security protocols
- key exchange
- secret sharing scheme
- secure communication
- digital libraries
- key agreement protocol
- standard model
- fault tolerance
- partially blind signature scheme