Abstract

Lee et al. recently presented a collection of n + 1 different n-party key agreement protocols based on multi-linear forms. Here we show that n − 2 of the protocols are completely insecure, being vulnerable to impersonation attacks.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call