Results 11 to 20 of about 780,853 (256)

Key agreement based on automaton groups [PDF]

open access: yesGroups Complexity Cryptology, 2019
Abstract We suggest several automaton groups as platforms for Anshel–Anshel–Goldfeld key agreement metascheme. They include Grigorchuk and universal Grigorchuk groups, Hanoi 3-towers group, the Basilica group and a subgroup of the affine group
Grigorchuk, R., Grigoriev, D.
openaire   +4 more sources

Tree-based group key agreement [PDF]

open access: yesACM Transactions on Information and System Security, 2004
Secure and reliable group communication is an active area of research. Its popularity is fueled by the growing importance of group-oriented and collaborative applications. The central research challenge is secure and efficient group key management. While centralized methods are often appropriate for key distribution in large multicast-style groups ...
Kim, Y. Kim, Yongdae   +2 more
openaire   +1 more source

Dynamic Group Multi-party Quantum Key Agreement [PDF]

open access: yesScientific Reports, 2018
AbstractThis paper presents a novel dynamic group multi-party Quantum Key Agreement (DGMQKA) protocol, achieved by a multicast transmission method. The proposed method is able to achieve arbitrary number of groups and members under the same resources.
Chou, Yao-Hsin   +3 more
openaire   +2 more sources

Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme

open access: yesIEEE Access, 2023
One of the fundamental construction blocks in safeguarding group communications is group key establishment protocols. Group key agreement protocols are more suitable for distributed environments where the participant from various places can agree upon ...
Rolla Subrahmanyam   +2 more
doaj   +1 more source

Automated Verification of Group Key Agreement Protocols [PDF]

open access: yes2014 IEEE Symposium on Security and Privacy, 2014
We advance the state-of-the-art in automated symbolic cryptographic protocol analysis by providing the first algorithm that can handle Diffie-Hellman exponentiation, bilinear pairing, and AC-operators. Our support for AC-operators enables protocol specifications to use multisets, natural numbers, and finite maps.
Schmidt, B   +3 more
openaire   +1 more source

Dynamic and efficient vehicular cloud management scheme with privacy protection

open access: yes网络与信息安全学报, 2022
The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the ...
Min XIAO   +3 more
doaj   +3 more sources

Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks

open access: yesComplexity, 2021
Vehicular ad hoc network (VANET) is a multihop mobile wireless communication network that can realize many vehicle-related applications through multitop communication.
Mei Sun   +3 more
doaj   +1 more source

A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders

open access: yesSensors, 2023
Modern cryptography attributes the security of a cryptographic system to the security of the key. How to securely distribute the key has always been a bottleneck in key management.
Jing Liu   +5 more
doaj   +1 more source

A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application

open access: yesIEEE Access, 2018
Telemedicine offers medical services remotely via telecommunications systems and physiological monitoring devices. Group-oriented communication is an important application for telemedicine.
Zhang Qikun   +4 more
doaj   +1 more source

Asymmetric Group Key Agreement [PDF]

open access: yes, 2009
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish a confidential channel among group members, we revisit the group key agreement definition and distinguish the conventional (symmetric ) group key agreement from asymmetric ...
Qianhong Wu   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy