2009
DOI: 10.3923/itj.2009.619.624
|View full text |Cite
|
Sign up to set email alerts
|

Anti-collusive Self-healing Key Distribution Scheme with Revocation Capability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(19 citation statements)
references
References 4 publications
0
19
0
Order By: Relevance
“…Although it is efficient in term of cost due to the elegantly designed mask polynomial, a collusion attack called sandwich attack may happen here. To prevent sandwich attack, Du et al introduce a secret random number for each session in [34]. Only if the random number is not cracked, attackers still get nothing about the session key.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Although it is efficient in term of cost due to the elegantly designed mask polynomial, a collusion attack called sandwich attack may happen here. To prevent sandwich attack, Du et al introduce a secret random number for each session in [34]. Only if the random number is not cracked, attackers still get nothing about the session key.…”
Section: Related Workmentioning
confidence: 99%
“…In the following sections, we give a detailed performance evaluation of the proposed LiSH+ scheme from the storage and communication point of view. [30] (t + 1) log q (t + 1) log q X scheme of [34] (2s 2 -2s 1 + 4) log q (t + (1 + m)/2) log q X Partial scheme3 of [37] (2m + 1) log q (2t + 1) log q X Partial LiSH (2s 2 -2s 1 + 6) log q (t + l + 1) log q X X X LiSH+ (t + s 2s 1 + 6) log q (t + l + 1) log q XDynamic X X…”
Section: Performance Evaluationmentioning
confidence: 99%
See 3 more Smart Citations