نتایج جستجو برای: key exchange

تعداد نتایج: 727500  

2011
T. Kivinen

This document defines a generic way for Internet Key Exchange version 2 (IKEv2) to use any of the symmetric secure password authentication methods. Multiple methods are already specified in other documents, and this document does not add any new one. This document specifies a way to agree on which method is to be used in the current connection. This document also provides a common way to transm...

Journal: :IACR Cryptology ePrint Archive 2010
Feng Hao Peter Y. A. Ryan

Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a shared password without requiring a Public Key Infrastructure (PKI). After more than a decade of extensive research in this field, there have been several PAKE protocols available. ...

2008
Feng Hao Peter Y. A. Ryan

Password-Authenticated Key Exchange (PAKE) studies how to establish secure communication between two remote parties solely based on their shared password, without requiring a Public Key Infrastructure (PKI). Despite extensive research in the past decade, this problem remains unsolved. Patent has been one of the biggest brakes in deploying PAKE solutions in practice. Besides, even for the patent...

Journal: :CoRR 2009
Eric Ke Wang Lucas Chi Kwong Hui Siu-Ming Yiu

Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authentica...

2001
Renate Scheidler Johannes A. Buchmann Hugh C. Williams

2011
Dirk Achenbach David Förster Christian Henrich Daniel Kraschewski Jörn Müller-Quade

Security of public key cryptography is steadily threatened by advancements in algorithmics and computing power. In this work we propose a novel approach to long-term secure key exchange based on security assumptions that are independent of strong complexity assumptions. We present a key propagation scheme that sets up a network of distributed keys. Whenever two parties meet, they exchange new k...

2005
Michel Abdalla David Pointcheval

The area of password-based authenticated key exchange protocols has been the subject of a vast amount of work in the last few years due to its practical aspects. In these protocols, the goal is to enable users communicating over an unreliable channel to establish a secure session key even when the secret key that they share is drawn from a small set of values. Despite the attention given to it,...

Journal: :IACR Cryptology ePrint Archive 2015
Matvei Kotov Alexander Ushakov

In this paper we consider a two party key-exchange protocol proposed in [4, Section 2] which uses tropical matrix algebra as a platform. Our analysis shows that the scheme is not secure.

1995
Chris Charnes Josef Pieprzyk Rei Safavi-Naini

In this paper we introduce unconditionally secure distributed delegation systems that allow groups of participants to collectively authorize a delegate to sign a message (construct an authentic message) on their behalf. We propose a model and investigate its properties when delegation is valid for one transmission. The model is extended to multiple delegation and constructions with more economi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید