Cryptanalysis and Improvement of Several Identity-Based Authenticated and Pairing-Free Key Agreement Protocols for IoT Applications. [PDF]
Sun H, Li C, Zhang J, Liang S, Huang W.
europepmc +1 more source
Blockchain-Based Data Access Control and Key Agreement System in IoT Environment. [PDF]
Lee J +6 more
europepmc +1 more source
A Lightweight Authentication and Key Agreement Protocol for IoT-Enabled Smart Grid System. [PDF]
Chen C +5 more
europepmc +1 more source
A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders. [PDF]
Liu J +5 more
europepmc +1 more source
Enhanced Authenticated Key Agreement for Surgical Applications in a Tactile Internet Environment. [PDF]
Lee TF, Ye X, Chen WY, Chang CC.
europepmc +1 more source
Unmanned aerial vehicles (UAVs) play a critical role in various fields, including logistics, agriculture, and rescue operations. Effective identity authentication and key agreement schemes are vital for UAV networks to combat threats.
Tao Xia +5 more
doaj +1 more source
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications. [PDF]
Li CT +5 more
europepmc +1 more source
Preventing Witness Leakage in Adaptor Signatures
Adaptor signature schemes allow two parties to trade fairly. When a valid signature is revealed, the secret witness can also be extracted. This is useful in blockchain settings such as atomic swaps and fair exchange. However, if an adversary obtains both
Jen-Chieh Hsu, Raylin Tso
doaj +1 more source
An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT. [PDF]
Tyagi P +4 more
europepmc +1 more source
Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments. [PDF]
Park Y, Ryu D, Kwon D, Park Y.
europepmc +1 more source

