Computer Science ›› 2006, Vol. 33 ›› Issue (8): 118-120.

Previous Articles     Next Articles

ZHANG Xue-Jun ,ZHOU Li-Hua, WANG Yu-Min (The Ministry of Edu. Key Lab. of Computer Network and Info. Security, Xidian Univ. , Xi'an 710071)   

  • Online:2018-11-17 Published:2018-11-17

Abstract: The session key S is divided into a sum of S1 and S2. Under the condition of large integer factoring problem, S1 is decrypted by constructing a special polynomial function (scheme 1 ). Under the condition of discrete logarithm problem, S2 is decrypted by

Key words: Collusion-resistance,Asymmetric, Long-lived subscriber's key, Black-box tracing

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!