Cargando…
Attack Algorithm for a Keystore-Based Secret Key Generation Method
A new attack algorithm is proposed for a secure key generation and management method introduced by Yang and Wu. It was previously claimed that the key generation method of Yang and Wu using a keystore seed was information-theoretically secure and could solve the long-term key storage problem in clou...
Autores principales: | Chae, Seungjae, Kim, Young-Sik, No, Jong-Seon, Kim, Young-Han |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514693/ https://www.ncbi.nlm.nih.gov/pubmed/33266927 http://dx.doi.org/10.3390/e21020212 |
Ejemplares similares
-
Protecting Physical Layer Secret Key Generation from Active Attacks
por: Mitev, Miroslav, et al.
Publicado: (2021) -
RIS-Enabled Secret Key Generation for Secured Vehicular Communication in the Presence of Denial-of-Service Attacks
por: Shawky, Mahmoud A., et al.
Publicado: (2023) -
An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay
por: Wang, Xiaowen, et al.
Publicado: (2023) -
Stealthy Secret Key Generation
por: Lin, Pin-Hsun, et al.
Publicado: (2020) -
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
por: Abdel Hakeem, Shimaa A., et al.
Publicado: (2022)