Categorical interpretations of some key agreement protocols
نویسندگان
چکیده
We give interpretations of some known key agreement protocols in the framework of category theory and in this way we give a method of constructing of many new key agreement protocols.
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملProperties and Dispositions: Some Metaphysical Remarks on Quantum Ontology
After some suggestions about how to clarify the confused metaphysical distinctions between dispositional and non-dispositional or categorical properties, I review some of the main interpretations of QM in order to show that – with the relevant exception of Bohm’s minimalist interpretation – quantum ontology is irreducibly dispositional. Such an irreducible character of dispositions must be expl...
متن کاملAn attack on some multi-party key agreement protocols
Lee, Lee and Lee [App. Math. and Comp. Vol. 159 , 2004, pp. 317-331] recently presented a collection of n + 1 different n-party key agreement protocols based on multi-linear forms. Here we show that n − 2 of the protocols are completely insecure, being vulnerable to impersonation attacks.
متن کاملOn the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
HMQV is a hashed variant of the MQV key agreement protocol proposed by Krawczyk at CRYPTO 2005. In this paper, we present some attacks on HMQV and MQV that are successful if public keys are not properly validated. In particular, we present an attack on the twopass HMQV protocol that does not require knowledge of the victim’s ephemeral private keys. The attacks illustrate the importance of perfo...
متن کاملDiffie-Hellman type key exchange protocols based on isogenies
In this paper, we propose some Diffie-Hellman type key exchange protocols using isogenies of elliptic curves. The first method which uses the endomorphism ring of an ordinary elliptic curve $ E $, is a straightforward generalization of elliptic curve Diffie-Hellman key exchange. The method uses commutativity of the endomorphism ring $ End(E) $. Then using dual isogenies, we propose...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1110.5252 شماره
صفحات -
تاریخ انتشار 2011