نتایج جستجو برای: key exchange

تعداد نتایج: 727500  

2005
Ashok Kumar Das Abhijit Das Surjyakanta Mohapatra Srihari Vavilapalli

In this paper we propose an improved alternative for the path key establishment phase of bootstrapping in a sensor network. Our scheme lets the network adapt to the deployment configuration by secure transmission of predistributed keys. This results in better connectivity than what path key establishment can yield. The communication overhead for our scheme is comparable with that for path key e...

Journal: :IACR Cryptology ePrint Archive 2013
Özgür Dagdelen Marc Fischlin Tommaso Gagliardoni Giorgia Azzurra Marson Arno Mittelbach Cristina Onete

We take a closer look at the Open Protocol for Access Control, Identification, and Ticketing with privacY (OPACITY). This Diffie–Hellman-based protocol is supposed to provide a secure and privacy-friendly key establishment for contactless environments. It is promoted by the US Department of Defense and meanwhile available in several standards such as ISO/IEC 24727-6 and ANSI 504-1. To the best ...

Journal: :IACR Cryptology ePrint Archive 2010
Jesse Walker Jiangtao Li

Anonymous digital signatures such as Direct Anonymous Attestation (DAA) and group signatures have been a fundamental building block for anonymous entity authentication. In this paper, we show how to incorporate DAA schemes into a key exchange protocol between two entities to achieve anonymous authentication and to derive a shared key between them. We propose a modification to the SIGMA key exch...

Journal: :Electr. Notes Theor. Comput. Sci. 2008
Zhoujun Li Hua Guo Xiyong Zhang

Client-to-client password authenticated key exchange (C2C-PAKE) protocol enables two clients who only share their passwords with their own servers to establish a shared key for their secure communications. Recently, Byun et al. and Yin-Li respectively proposed first provably secure C2C-PAKE protocols. However, both protocols are found to be vulnerable to undetectable online dictionary attacks a...

2007
Zhiguo Wan Robert H. Deng Feng Bao Bart Preneel

Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a hierarchical group PAKE protocol nPAKE protocol under the setting where each party shares an independent password with a trusted server. The nPAKE protocol is a novel combination of the hierarchica...

Journal: :IACR Cryptology ePrint Archive 2016
Luke Valenta David Adrian Antonio Sanso Shaanan Cohney Joshua Fried Marcella Hastings J. Alex Halderman Nadia Heninger

Several recent standards, including NIST SP 80056A and RFC 5114, advocate the use of “DSA” parameters for Diffie-Hellman key exchange. While it is possible to use such parameters securely, additional validation checks are necessary to prevent well-known and potentially devastating attacks. In this paper, we observe that many Diffie-Hellman implementations do not properly validate key exchange i...

2014
Christoph Bader Dennis Hofheinz Tibor Jager Eike Kiltz Yong Li

We construct the first Authenticated Key Exchange (AKE) protocol whose security does not degrade with an increasing number of users or sessions. We describe a three-message protocol and prove security in an enhanced version of the classical Bellare-Rogaway security model. Our construction is modular, and can be instantiated efficiently from standard assumptions (such as the SXDH or DLIN assumpt...

Journal: :IACR Cryptology ePrint Archive 2005
Kristin E. Lauter Anton Mityagin

KEA is a Diffie-Hellman based key-exchange protocol developed by NSA which provides mutual authentication for the parties. It became publicly available in 1998 and since then it was neither attacked nor proved to be secure. We analyze the security of KEA and find that the original protocol is susceptible to a class of attacks. On the positive side, we present a simple modification of the protoc...

Journal: :IACR Cryptology ePrint Archive 2008
Hai Huang Zhenfu Cao

Currently, there are a lot of authenticated key exchange (AKE) protocols in literature. However, the security proofs of this kind of protocols have been established to be a non-trivial task. The main issue is that without static private key it is difficult for simulator to fully support the SessionKeyReveal and EphemeralKeyReveal queries. Some proposals which have been proven secure either just...

2012
Zheng Yang Jörg Schwenk

Malicious insider security of authenticated key exchange (AKE) protocol addresses the situation that an AKE protocol is secure even with existing dishonest parties established by adversary in corresponding security experiment. In the eCK model, the EstablishParty query is used to model the malicious insider setting. However such strong query is not clearly formalized so far. We show that the pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید