Results 1 to 10 of about 1,013,153 (241)

Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things [PDF]

open access: yesSensors, 2022
To solve the problem regarding the lack of a lightweight and secure authentication and key agreement protocol in the Constrained Application Protocol of the Internet of Things environment, we explore the security flaws and applicability problems in the ...
Xiang Gong, Tao Feng
doaj   +2 more sources

Experimental Efficient Source-Independent Quantum Conference Key Agreement [PDF]

open access: yesResearch
Multipartite entanglement enables secure group key distribution among multiple users while providing immunity against hacking attacks targeting source devices, thereby realizing source-independent quantum conference key agreement (SI-QCKA).
Wen-Ji Hua   +4 more
doaj   +2 more sources

Experimental quantum conference key agreement. [PDF]

open access: yesSci Adv, 2021
When Alice and Bob invite their friends, quantum key distribution with multiparty entanglement enables secure conference call.
Proietti M   +5 more
europepmc   +6 more sources

Unique Information and Secret Key Agreement [PDF]

open access: yesEntropy, 2018
The partial information decomposition (PID) is a promising framework for decomposing a joint random variable into the amount of influence each source variable X i has on a target variable Y, relative to the other sources.
Ryan G. James   +2 more
doaj   +2 more sources

Secure multiparty quantum key agreement against collusive attacks [PDF]

open access: yesScientific Reports, 2021
Quantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private ...
Hussein Abulkasim   +2 more
doaj   +2 more sources

Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak [PDF]

open access: yesSensors, 2020
Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient ...
An Braeken
doaj   +2 more sources

Measurement-device-independent multi-party quantum key agreement

open access: yesFrontiers in Quantum Science and Technology, 2023
Quantum key agreement (QKA) is an important quantum cryptography primitive. In a QKA protocol, two or more untrusted parties can agree on an identical key in such a way that they equally influence the key and no subset can decide it alone.
Bing-Xin Liu   +4 more
doaj   +1 more source

Key Agreement Over Inter-Process Communication

open access: yesIEEE Access, 2021
Today’s computer is often infected by malwares and conventional communication channels such as inter-process communication (IPC) are attractive attack surface for attackers because important information such as user’s personal data and ...
Manami Suzuki   +4 more
doaj   +1 more source

Plactic key agreement (insecure?)

open access: yesJournal of Mathematical Cryptology, 2023
Plactic key agreement is a new type of cryptographic key agreement that uses Knuth’s multiplication of semistandard tableaux from combinatorial algebra.
Brown Daniel R. L.
doaj   +1 more source

High Key Rate Quantum Conference Key Agreement With Unconditional Security

open access: yesIEEE Access, 2021
Quantum cryptography is a major ingredient of the future quantum internet that promises various secure communication tasks. Quantum conference key agreement (CKA) is an important cryptographic primitive of quantum cryptography, which provides the ...
Xiao-Yu Cao   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy