Key agreement based on automaton groups
نویسندگان
چکیده
منابع مشابه
Efficient Group Key Agreement on Tree-based Braid Groups
The security issues in ad hoc network are increasingly important. In this paper, we propose a distributed key management what approach by using braid groups and key tree. Without any assumption of prefixed trust relationship between nodes, the proposed method works in a self-organizing way to provide the key management services. The using of the proposed tree-based braid groups has following ad...
متن کاملOn Key Agreement and Conference Key Agreement
An attack is demonstrated on a previously proposed class of key agreement protocols. Analysis of the attack reveals that a small change in the construction of the protocols is suucient to prevent the attack. The insight gained allows a generalisation of the class to a new design for conference key agreement protocols.
متن کاملKey Agreement in Dynamic Peer Groups
ÐAs a result of the increased popularity of group-oriented applications and protocols, group communication occurs in many different settings: from network multicasting to application layer teleand videoconferencing. Regardless of the application environment, security services are necessary to provide communication privacy and integrity. This paper considers the problem of key agreement in dynam...
متن کاملOn Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using symmetric-key cryptography for cost reasons. The consequence is that common daily used security protocols such as Bluetooth pairing are insecure in the sense that an adversary can easily extract the main private key from the proto...
متن کاملOn Robust Key Agreement Based on Public Key Authentication
We describe two new attacks on the HMQV protocol. The first attack raises a serious question on the basic definition of “authentication” in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr’s signature. Among all the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Groups Complexity Cryptology
سال: 2019
ISSN: 1869-6104,1867-1144
DOI: 10.1515/gcc-2019-2012