Results 21 to 30 of about 400,439 (156)

Multiparty key agreement protocols

open access: yesIEE Proceedings - Computers and Digital Techniques, 2000
A class of multiparty key agreement protocols based on secret sharing is presented. The trust infrastructure necessary to achieve the intended security goals is discussed. Entity authentication is suggested to be replaced by a less expensive group authentication. Two key agreement protocols are discussed.
Pieprzyk, J., Li, C. H.
openaire   +3 more sources

Key agreement protocol in infinite semigroup representation level

open access: yesLietuvos Matematikos Rinkinys, 2007
Matrix decomposition problem over integer ring is presented. Solving methods are discussed and it is showed, that this problem is hard computational problem regard to computer memory resources.
Artūras Katvickis   +2 more
doaj   +1 more source

Quantum key agreement protocol

open access: yesElectronics Letters, 2004
By replacing a classical channel with a quantum one during quantum teleportation, a quantum key agreement protocol is presented. The key bits are determined only by the random measurement outcomes and are independent of the states transmitted over the channel.
N. Zhou, G. Zeng, J. Xiong
openaire   +1 more source

Enhanced Wireless Sensor Network Authentication Key Agreement Protocol [PDF]

open access: yesJisuanji gongcheng
Security of data transmission is one of the most significant security threats faced by Wireless Sensor Network (WSN), for which the Authentication Key Agreement (AKA) protocol is an effective solution.
DENG Miaolei, MA Qingyu, SONG Qing, ZHANG Chunyan, ZUO Zhibin
doaj   +1 more source

Automated Verification of Group Key Agreement Protocols [PDF]

open access: yes2014 IEEE Symposium on Security and Privacy, 2014
We advance the state-of-the-art in automated symbolic cryptographic protocol analysis by providing the first algorithm that can handle Diffie-Hellman exponentiation, bilinear pairing, and AC-operators. Our support for AC-operators enables protocol specifications to use multisets, natural numbers, and finite maps.
Schmidt, B   +3 more
openaire   +1 more source

MULTIPARTY KEY AGREEMENT PROTOCOL BASED ON SYMMETRIC TECHNIQUES [PDF]

open access: yesCommunications of the Korean Mathematical Society, 2003
Summary: We propose multiparty key agreement protocols by generalizing the Blom's scheme based on \(2\) variable polynomials. Especially we develop three party and four party key agreement schemes with security. The advantage of the new schemes is to have small demands on storage space.
Lee, Hyang-Sook   +2 more
openaire   +3 more sources

Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme

open access: yesIEEE Access, 2023
One of the fundamental construction blocks in safeguarding group communications is group key establishment protocols. Group key agreement protocols are more suitable for distributed environments where the participant from various places can agree upon ...
Rolla Subrahmanyam   +2 more
doaj   +1 more source

Reusing Static Keys in Key Agreement Protocols [PDF]

open access: yes, 2009
Contrary to conventional cryptographic wisdom, the NIST SP 800-56A standard explicitly allows the use of a static key pair in more than one of the key establishment protocols described in the standard. In this paper, we give examples of key establishment protocols that are individually secure, but which are insecure when static key pairs are reused in ...
Chatterjee, Sanjit   +2 more
openaire   +2 more sources

Neural Key Agreement Protocol with Extended Security

open access: yesApplied Sciences
Key agreement protocols based on neural synchronization with Tree Parity Machines (TPMs) offer promising security advantages: they do not rely on trapdoor functions, making them resistant to quantum attacks, and they avoid the need for specialized ...
Mihail-Iulian Pleşa   +2 more
doaj   +1 more source

Towards a Provably Secure Authentication Protocol for Fog-Driven IoT-Based Systems

open access: yesApplied Sciences, 2023
The emergence of fog-based Internet of Things (IoT) systems have played a significant role in enhancing the applicability of the IoT paradigm. In such systems, fog-nodes are proficient enough to retain, process and transmit the data coming from IoT ...
Minahil Rana   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy