A secure key agreement protocol
Summary: We propose a secure protocol for an authenticated key agreement based on the Diffie-Hellman key agreement, which works in an elliptic curve group. We prove that our protocol meets certain security attributes under the assumption that the elliptic curve discrete logarithm problem is secure.
openaire +2 more sources
A Lightweight Authentication and Key Agreement Protocol for IoT-Enabled Smart Grid System. [PDF]
Chen C +5 more
europepmc +1 more source
Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things. [PDF]
Gong X, Feng T.
europepmc +1 more source
Lightweight authentication key agreement protocol for Internet of vehicles
An analysis of the two-stage authentication and key agreement protocol for commuting in Internet of vehicles proposed by Zhang et al. revealed its vulnerability to various malicious attacks, which included secret leakage attack and man-in-the-middle ...
LIU Yali +4 more
doaj +2 more sources
A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography. [PDF]
Chen Y, Chen J.
europepmc +1 more source
Three-party password authenticated key agreement protocol with user anonymity based on lattice
With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two
Caifen WANG, Li CHEN
doaj +2 more sources
Pairing Free Certified Common Asymmetric Group Key Agreement Protocol for Data Sharing Among Users with Different Access Rights. [PDF]
Braeken A.
europepmc +1 more source
Authenticated Diffe-Hellman Key Agreement Protocols [PDF]
This paper surveys recent work on the design and analysis of key agreement protocols that are based on the intractability of the Diffie-Hellman problem. The focus is on protocols that have been standardized, or are in the process of being standardized, by organizations such as ANSI, IEEE, ISO/IEC, and NIST.
Simon Blake-Wilson, Alfred Menezes
openaire +1 more source
EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications
Machine to machine (M2M) communications, also called machine-type communications (MTC), has widely been utilized in applications such as telemetry, industrial, automation, and SCADA systems.
Rong Jiang +4 more
doaj +1 more source
Secret sharing-based authentication and key agreement protocol for machine-type communications
One of the main challenges for the development of the Internet of Things is the authentication of large numbers of devices/sensors, commonly served by massive machine-type communications, which jointly with long-term evolution has been considered one of ...
Ana Paula G Lopes +3 more
doaj +1 more source

