z-logo
open-access-imgOpen Access
ANALISIS ATRIBUT KEAMANAN TERHADAP PERBAIKAN PROTOKOL GROUP KEY TRANSFER : PROTOKOL HSU
Author(s) -
I Made Mustika Kerta Astawa,
Rahmi Nurazizah
Publication year - 2017
Publication title -
jurnal ilmiah matematika dan pendidikan matematika (jmp)/jurnal ilmiah matematika dan pendidikan matematika
Language(s) - English
Resource type - Journals
eISSN - 2550-0422
pISSN - 2085-1456
DOI - 10.20884/1.jmp.2017.9.1.2851
Subject(s) - group key , computer science , key (lock) , protocol (science) , secret sharing , cryptography , discrete logarithm , key agreement protocol , verifiable secret sharing , computer security , computer network , public key cryptography , key distribution , encryption , medicine , alternative medicine , pathology , set (abstract data type) , programming language
Protocol Hsu et.al first introduced in 2012 and is the protocol type Group Key Transfer based Linear Shamir's Secret Sharing Scheme (LSSS). The main idea of this protocol is to use m-secret sharing perspective. This protocol assumes that the difficulty of discrete logarithm problem (DLP) (ie given  is computationally very difficult/not feasible to count ) and Cryptographyc Diffie Hellman (CDH) (ie given  and  it is computationally very difficult/not feasible to count ) in . Thus, it needs to analyze the security attributes to this mechanism Protocol Hsu. Good cryptographic protocols should meet the security attributes Known Security Key, Key-Compromise Impersonation Resillience, Unknown Key-Share Resillience, Key Control and Key Confirmation.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here