نتایج جستجو برای: key agreement protocol

تعداد نتایج: 929539  

Journal: :Etri Journal 2023

Authenticated multiple key agreement (AMKA) protocols provide participants with session keys after one round of authentication. Many schemes use Diffie–Hellman or authenticated that rely on hard integer factorizations are vulnerable to quantum algorithms. Lattice cryptography provides resistance protocols, but the certificate always incurs excessive public infrastructure management overhead. Th...

2002
K. C. Reddy Divya Nalla

An important and popular trend in modern computing is to convert traditional centralized services into distributed services spread across multiple systems and networks. One-way function trees can be used to extend two-party Key Agreement protocols to n-party protocols. Tree-based Group Diffie-Hellman [17] is one such protocol. This paper proposes the first Identity based Group Key Agreement pro...

2013
Mahdi Aiash

Future mobile networking will involve the convergence of different wireless networks such as 2G, 3G, WiMax and Long Term Evolution. The wide scale deployment of such heterogeneous networks will precipitate a radical change in the network infrastructure, where currently closed systems such as 3G will have to operate in an open environment. This brings to the fore certain security issues which mu...

Journal: :IACR Cryptology ePrint Archive 2007
Chunbo Ma Jun Ao Jianhua Li

A password-based tripartite key agreement protocol is presented in this paper. The three entities involved in this protocol can negotiate a common session key via a shared password over insecure networks. Proofs are given to show that the proposed protocol is secure against forging and chosen message attacks in the case of without actually running a dictionary attack.

2003
Kee-Won Kim Eun-Kyung Ryu Hyung-Mok Lee Kee-Young Yoo

Authenticated key agreement protocols play a significant role in securing communications over public network channels (Internet). This paper proposes a new key agreement protocol based on factorization problem over nonabelian groups. Then it presents two different ways to provide mutual authentication for the proposed protocol; this paper presents a new authenticated key agreement protocol usin...

Journal: :IEICE Transactions on Information and Systems 2010

Journal: :IACR Cryptology ePrint Archive 2011
Charles Rackoff

There is a great deal of confusion in the cryptology literature relating to various identity related issues. By “names” (lower case), we are referring to informal, personal ways that we indicate others; by “NAMES” (upper case) we are referring to official ways that we use to indicate others. Both of these concepts are often confused with “identity”, which is something else altogether, and with ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید