Results 11 to 20 of about 12,317,693 (236)
Quantum Conference Key Agreement: A Review [PDF]
Conference key agreement (CKA), or multipartite key distribution, is a cryptographic task where more than two parties wish to establish a common secret key. A composition of bipartite quantum key distribution protocols can accomplish this task.
Gláucia Murta +3 more
semanticscholar +3 more sources
Measurement-device-independent multi-party quantum key agreement
Quantum key agreement (QKA) is an important quantum cryptography primitive. In a QKA protocol, two or more untrusted parties can agree on an identical key in such a way that they equally influence the key and no subset can decide it alone.
Bing-Xin Liu +4 more
doaj +1 more source
Key Agreement Over Inter-Process Communication
Today’s computer is often infected by malwares and conventional communication channels such as inter-process communication (IPC) are attractive attack surface for attackers because important information such as user’s personal data and ...
Manami Suzuki +4 more
doaj +1 more source
Recently, the fog computing concept has been introduced into vehicular ad-hoc networks (VANETs) to formulate fog-based VANETs. Since the communication channels between vehicles and fog nodes are open and insecure, it is necessary to construct an ...
Lu Wei +4 more
semanticscholar +1 more source
Plactic key agreement (insecure?)
Plactic key agreement is a new type of cryptographic key agreement that uses Knuth’s multiplication of semistandard tableaux from combinatorial algebra.
Brown Daniel R. L.
doaj +1 more source
High Key Rate Quantum Conference Key Agreement With Unconditional Security
Quantum cryptography is a major ingredient of the future quantum internet that promises various secure communication tasks. Quantum conference key agreement (CKA) is an important cryptographic primitive of quantum cryptography, which provides the ...
Xiao-Yu Cao +5 more
doaj +1 more source
Key agreement protocol in Braid group representation level
In this paper the key agreement protocol is given and the applicationof it in Braid groups is suggested. The one way of protocol is being justified.
Povilas Tvarijonas +2 more
doaj +1 more source
Robust key agreement schemes [PDF]
This paper considers a key agreement problem in which two parties aim to agree on a key by exchanging messages in the presence of adversarial tampering. The aim of the adversary is to disrupt the key agreement process, but there are no secrecy constraints (i.e. we do not insist that the key is kept secret from the adversary).
Chan, Terence, Cai, Ning, Grant, Alex
openaire +3 more sources
A secure authentication and key agreement scheme with dynamic management for vehicular networks
The development of 5G communication, big data technology and intelligent transportation system has driven the rapid development of vehicle network (VANET).
Yuxiang Zhou +2 more
doaj +1 more source
Anonymous Quantum Conference Key Agreement
Conference key agreement (CKA) is a cryptographic effort of multiple parties to establish a shared secret key. In future quantum networks, generating secret keys in an anonymous way is of tremendous importance for parties that want to keep their shared ...
Frederik Hahn, Jarn de Jong, Anna Pappa
doaj +1 more source

