Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak [PDF]
Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient ...
An Braeken
doaj +2 more sources
Cryptanalysis and improved mutual authentication key agreement protocol using pseudo-identity. [PDF]
The authentication key agreement is a scheme that generates a session key for encrypted communication between two participants. In the authentication key agreement, to provide the mutual authentication and the robust session key agreement is one of the ...
Hyang-Rim Jo +3 more
doaj +2 more sources
A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol [PDF]
With the rapid development of mobile networks, there are more and more application scenarios that require group communication. For example, in mobile edge computing, group communication can be used to transmit messages to all group members with minimal ...
Zisang Xu +5 more
doaj +2 more sources
Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS [PDF]
The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians.
Hyunsung Kim
doaj +2 more sources
A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes [PDF]
Security and efficiency are the two main challenges for designing a smart home system. In this paper, by incorporating Chinese remainder theorem (CRT) into the elliptic curve Diffie−Hellman (ECDH), a lightweight key agreement protocol for smart ...
Yi Jiang, Yong Shen, Qingyi Zhu
doaj +2 more sources
Hierarchical certificateless authenticated key agreement protocol
A hierarchical certificateless authenticated key agreement protocol was proposed, and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model, the security of the protocol was based on the computa-tional Diffie-Hellman assumption.
Hang SU, Jian-wei LIU, Rui TAO
doaj +3 more sources
A cloud-assisted key agreement protocol for the E-healthcare system [PDF]
Ismail Keshta
doaj +2 more sources
Authentication and Key Agreement Protocol for UAV Communication [PDF]
In order to achieve the requirement for security and lightweight in unmanned aerial vehicle(UAV)communication,two authentication and key agreement protocols targeted for UAVs with different computational performance are proposed,including an ECC based ...
JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang
doaj +1 more source
Key agreement protocol in Braid group representation level
In this paper the key agreement protocol is given and the applicationof it in Braid groups is suggested. The one way of protocol is being justified.
Povilas Tvarijonas +2 more
doaj +1 more source
Comment on “Quantum key agreement protocol” [PDF]
The first two-party Quantum Key Agreement (QKA) protocol, based on quantum teleportation, was proposed by Zhou et al. (Electron. Lett. 40(18) (2004) 1149). In this protocol, to obtain the key bit string, one of the parties uses a device to obtain the inner product of two quantum states, one being unknown, and the other one performs Bell measurement ...
Nayana Das, Ritajit Majumdar
openaire +2 more sources

