نتایج جستجو برای: key

تعداد نتایج: 553708  

2007
Hyewon Park Kyusuk Han Chan Yeob Yeun Kwangjo Kim

In modern network computing, authenticated group key agreement (AGKA) is important for conferencing. After Shamir [2] proposed the ID-based cryptosystem in 1984, the various applications on the ID-based cryptosystem have been actively studied, due to the simple key management complexity. For the AGKA, Choi et al. [16] proposed an ID-based authenticated group key agreement with bilinear maps, wh...

Journal: :IEICE Transactions 2011
Chia-Yin Lee Zhi-Hui Wang Lein Harn Chin-Chen Chang

Group key establishment is an important mechanism to construct a common session key for group communications. Conventional group key establishment protocols use an on-line trusted key generation center (KGC) to transfer the group key for each participant in each session. However, this approach requires that a trusted server be set up, and it incurs communication overhead costs. In this article,...

Journal: :IACR Cryptology ePrint Archive 2007
Yuh-Min Tseng

This paper presents an efficient identity-based key exchange protocol based on the difficulty of computing a Elliptic Curve Discrete Logarithm Problem. As compared with the previously proposed protocols, it has better performance in terms of the computational cost and the communication steps. Key exchange protocols allow two parties communicating over a public network to establish a common secr...

Journal: :npj Quantum Information 2022

Abstract Global quantum communications will enable long-distance secure data transfer, networked distributed information processing, and other entanglement-enabled technologies. Satellite communication overcomes optical fibre range limitations, with the first realisations of satellite key distribution (SatQKD) being rapidly developed. However, limited transmission times between ground station s...

2009
Qianhong Wu Yi Mu Willy Susilo Bo Qin Josep Domingo-Ferrer

A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish a confidential channel among group members, we revisit the group key agreement definition and distinguish the conventional (symmetric) group key agreement from asymmetric group key agreement (ASGKA) protocols. Instea...

2014
Sung-Woon Lee Hyunsung Kim

Wireless sensor networks (WSNs) are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these WSNs. Sensor nodes with resource-constrained make security applications a challenging problem. Key agreement is a fundamental security service in WSNs, which enables sensor nodes to communicate securely with each other using cryptographic t...

Journal: :Int. J. Communication Systems 2013
Daojing He Chun Chen Maode Ma Sammy Chan Jiajun Bu

Password-authenticated group key exchange protocols enable communication parties to establish a common secret key (a session key) by only using short secret passwords. Such protocols have been receiving significant attention. This paper shows some security weaknesses in some recently proposed passwordauthenticated group key exchange protocols. Furthermore, a secure and efficient password-authen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید