INAKA: Improved Authenticated Key Agreement Protocol Based on Newhope
نویسندگان
چکیده
منابع مشابه
Chameleon-Based Deniable Authenticated Key Agreement Protocol
As a useful means of safeguarding privacy of communications, deniable authentication has received much attention. A Chameleon-based deniable authenticated key agreement protocol is presented in this paper. The protocol has following properties. Any one of the two participants can’t present a digital proof to convince a third party that a claimed agreement has really taken place. Once a forgery ...
متن کاملIdentity Based Authenticated Group Key Agreement Protocol
An important and popular trend in modern computing is to convert traditional centralized services into distributed services spread across multiple systems and networks. One-way function trees can be used to extend two-party Key Agreement protocols to n-party protocols. Tree-based Group Diffie-Hellman [17] is one such protocol. This paper proposes the first Identity based Group Key Agreement pro...
متن کاملImproved Yen-Joye’s Authenticated Multiple-key Agreement Protocol∗
In this article, we propose an authenticated multiple-key agreement protocol. The protocol not only secure to against the unknown-key attack but also more efficient than the other protocols.
متن کاملCryptanalysis of the improved authenticated key agreement protocol
Hsu et al. recently pointed out that the Ku–Wang scheme is vulnerable to modification attack and further proposed an improvement on their scheme. However, this article will show the improvement which they claim is still vulnerable by off-line password guessing attack. 2005 Published by Elsevier Inc.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.2977137