Logo des Repositoriums
 

Multi-LHL protocol

dc.contributor.authorMitrengová, Marika
dc.contributor.editorKatzenbeisser, Stefan
dc.contributor.editorLotz, Volkmar
dc.contributor.editorWeippl, Edgar
dc.date.accessioned2019-01-25T14:17:29Z
dc.date.available2019-01-25T14:17:29Z
dc.date.issued2014
dc.description.abstractWe present a password-authenticated group key exchange protocol where each user has his/her own password. Advantage of such protocol is in short passwords, which can be easily memorized. On the other hand these protocols face the low password entropy. In the first part we define security model based on models of Abdalla, Fouque and Pointcheval and Bellare, Pointcheval, Rogaway. We construct the MLHL (Multi-LHL) protocol, which is based on the LHL protocol proposed by Lee, Hwang and Lee. However, the LHL protocol is flawed as pointed by Abdalla, Bresson, Chevassut and Choo, Raymond. We prove that our protocol is secure authenticated key exchange protocol with forward secrecy property and that the protocol is resistant against attacks on the LHL protocol.en
dc.identifier.isbn978-3-88579-622-0
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/20064
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-263
dc.titleMulti-LHL protocolen
dc.typeText/Conference Paper
gi.citation.endPage480
gi.citation.publisherPlaceBonn
gi.citation.startPage461
gi.conference.date19.-21. März 2014
gi.conference.locationWien, Österreich
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
461.pdf
Größe:
189.5 KB
Format:
Adobe Portable Document Format