Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhong Yantao is active.

Publication


Featured researches published by Zhong Yantao.


Journal of Communications and Networks | 2010

A highly secure identity-based authenticated key-exchange protocol for satellite communication

Zhong Yantao; Ma Jianfeng

In recent years, significant improvements have been made to the techniques used for analyzing satellite communication and attacking satellite systems. In 2003, a research team at Los Alamos National Laboratory, USA, demonstrated the ease with which civilian global positioning system (GPS) spoofing attacks can be implemented. They fed fake signals to the GPS receiver so that it operates as though it were located at a position different from its actual location. Moreover, Galileo in-orbit validation element A and Compass-M1 civilian codes in all available frequency bands were decoded in 2007 and 2009. These events indicate that cryptography should be used in addition to the coding technique for secure and authenticated satellite communication. In this study, we address this issue by using an authenticated key-exchange protocol to build a secure and authenticated communication channel for satellite communication. Our protocol uses identity-based cryptography. We also prove the security of our protocol in the extended Canetti-Krawczyk model, which is the strongest security model for authenticated key-exchange protocols, under the random oracle assumption and computational Diffie-Hellman assumption. In addition, our protocol helps achieve high efficiency in both communication and computation and thus improve security in satellite communication.


Computer Science | 2011

A Kind of Authentication Routing Protocol Based on Double Satellite Network in Space Information Network

Zhong Yantao


Archive | 2016

Application security management method and system

Zhong Yantao; Fu Wenzhi; Jiang Luo


Archive | 2016

Call control method and core network device

Jiang Luo; Zhong Yantao; Fu Wenzhi; Lyu Nan


Archive | 2016

Processing method for traffic data of base station and base station

Zhong Yantao; Fu Wenzhi; Jiang Luo


Archive | 2018

DOWNLINK HARQ FEEDBACK METHOD BASED ON DYNAMIC FRAME STRUCTURE, DEVICE, AND TERMINAL

Liu Shixiao; Zhong Yantao; Guo Xiongwei


Archive | 2018

VOICE ENCRYPTION TESTING METHOD AND TESTING DEVICE

Zhong Yantao; Fu Wenzhi; Jiang Luo


Archive | 2018

METHOD AND SYSTEM FOR ESTABLISHING PUSH-TO-TALK COMMUNICATION

Zhong Yantao; Fu Wenzhi; Jiang Luo


Archive | 2018

METHOD AND APPARATUS FOR QUERYING TERMINAL INFORMATION

Zhong Yantao; Fu Wenzhi; Jiang Luo


Archive | 2018

COMMUNICATION METHOD, SECURE TERMINAL, AND SYSTEM

Zhong Yantao; Fu Wenzhi; Jiang Luo

Collaboration


Dive into the Zhong Yantao's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wang Lichun

Nanjing Agricultural University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zhang Lihua

University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge