Results 21 to 30 of about 1,013,153 (241)
Reusing Static Keys in Key Agreement Protocols [PDF]
Contrary to conventional cryptographic wisdom, the NIST SP 800-56A standard explicitly allows the use of a static key pair in more than one of the key establishment protocols described in the standard. In this paper, we give examples of key establishment protocols that are individually secure, but which are insecure when static key pairs are reused in ...
Chatterjee, Sanjit +2 more
openaire +2 more sources
A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks.
Qiang Li
doaj +1 more source
Anonymous conference key agreement in linear quantum networks [PDF]
Sharing multi-partite quantum entanglement between parties allows for diverse secure communication tasks to be performed. Among them, conference key agreement (CKA) - an extension of key distribution to multiple parties - has received much attention ...
Jarn de Jong +4 more
doaj +1 more source
Key Agreement via Protocols [PDF]
Inspired by the ideas of no cloning and measurable degrading that quantum key agreement protocols rely on, we devise novel key agreement protocols for the classical world. Our protocols are based on identical devices that are mass produced and distributed among parties participating in the protocol.
Roscoe, A, Wang, L
openaire +2 more sources
The healthcare sector is a very crucial and important sector of any society, and with the evolution of the various deployed technologies, like the Internet of Things (IoT), machine learning and blockchain it has numerous advantages.
Siddhant Thapliyal +5 more
doaj +1 more source
Comment on “Quantum key agreement protocol” [PDF]
The first two-party Quantum Key Agreement (QKA) protocol, based on quantum teleportation, was proposed by Zhou et al. (Electron. Lett. 40(18) (2004) 1149). In this protocol, to obtain the key bit string, one of the parties uses a device to obtain the inner product of two quantum states, one being unknown, and the other one performs Bell measurement ...
Nayana Das, Ritajit Majumdar
openaire +2 more sources
An Efficient, Hybrid Authentication Using ECG and Lightweight Cryptographic Scheme for WBAN
The Wireless Body Area Network (WBAN) plays a pivotal role in providing ubiquitous computing and has applications in different fields, especially in health monitoring. The advancement in wearable devices has revolutionized the concept of medical services
Zia Ur Rehman +5 more
doaj +1 more source
Authentication and Key Agreement Protocol for UAV Communication [PDF]
In order to achieve the requirement for security and lightweight in unmanned aerial vehicle(UAV)communication,two authentication and key agreement protocols targeted for UAVs with different computational performance are proposed,including an ECC based ...
JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang
doaj +1 more source
Conference key agreement with single-photon interference
The intense research activity on Twin-Field (TF) quantum key distribution (QKD) is motivated by the fact that two users can establish a secret key by relying on single-photon interference in an untrusted node.
Federico Grasselli +2 more
doaj +1 more source
ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things
The Internet of Medical Things (IoMT) is a unification of smart healthcare devices, tools, and software, which connect various patients and other users to the healthcare information system through the networking technology. It further reduces unnecessary
Mohammad Wazid +5 more
doaj +1 more source

