INAKA: Improved Authenticated Key Agreement Protocol Based on Newhope

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chameleon-Based Deniable Authenticated Key Agreement Protocol

As a useful means of safeguarding privacy of communications, deniable authentication has received much attention. A Chameleon-based deniable authenticated key agreement protocol is presented in this paper. The protocol has following properties. Any one of the two participants can’t present a digital proof to convince a third party that a claimed agreement has really taken place. Once a forgery ...

متن کامل

Identity Based Authenticated Group Key Agreement Protocol

An important and popular trend in modern computing is to convert traditional centralized services into distributed services spread across multiple systems and networks. One-way function trees can be used to extend two-party Key Agreement protocols to n-party protocols. Tree-based Group Diffie-Hellman [17] is one such protocol. This paper proposes the first Identity based Group Key Agreement pro...

متن کامل

Improved Yen-Joye’s Authenticated Multiple-key Agreement Protocol∗

In this article, we propose an authenticated multiple-key agreement protocol. The protocol not only secure to against the unknown-key attack but also more efficient than the other protocols.

متن کامل

Cryptanalysis of the improved authenticated key agreement protocol

Hsu et al. recently pointed out that the Ku–Wang scheme is vulnerable to modification attack and further proposed an improvement on their scheme. However, this article will show the improvement which they claim is still vulnerable by off-line password guessing attack. 2005 Published by Elsevier Inc.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2020

ISSN: 2169-3536

DOI: 10.1109/access.2020.2977137