Abstract
Lee et al. recently presented a collection of n + 1 different n-party key agreement protocols based on multi-linear forms. Here we show that n − 2 of the protocols are completely insecure, being vulnerable to impersonation attacks.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have