Welcome to the resource topic for 2005/457
Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol
Authors: Jue-Sam Chou, Chu-Hsing Lin, Chia-Hung ChiuAbstract:
In this article we show that Shim¡¦s new ID-based tripartite multiple-key agreement protocol still suffers from the impersonation attack, a malicious user can launch an impersonation attack on their protocol.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .