Multiparty key agreement protocols

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multiparty Key Agreement Using Bilinear Map

⎯ A key agreement protocol is a cryptographical primitive which allows participants to share a common secret key via insecure channel. In particular, a multiparty key agreement protocol is a key agreement protocol that can manage arbitrary number of participants at once. In the security point of view, authentication and forward secrecy are the most important requirements in such protocols. One ...

متن کامل

Multiparty quantum key agreement with single

Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: 1) Outside eavesdroppers cannot gain the generated key without introducing any error; 2) The generated key cannot be determined by any non-trivial subset of the participants.That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside part...

متن کامل

Overview of Key Agreement Protocols

The emphasis of this paper is to focus on key agreement. To this aim, we address a selfcontained, up-to-date presentation of key agreement protocols at high level. We have attempted to provide a brief but fairly complete survey of all these schemes.

متن کامل

On Efficient Key Agreement Protocols

A class of efficient key agreement protocols proposed by Boyd is examined. An attack is demonstrated on a round-optimal example protocol of this class, and a simple countermeasure is suggested. The whole class is known to be vulnerable to an attack proposed by Bauer, Berson and Feiertag. A new class of key agreement protocols without this vulnerability but having the same advantages in efficien...

متن کامل

Multiparty quantum key agreement protocol secure against collusion attacks

The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest parti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEE Proceedings - Computers and Digital Techniques

سال: 2000

ISSN: 1350-2387

DOI: 10.1049/ip-cdt:20000531