Results 51 to 60 of about 12,317,693 (236)

Orthogonal-state-based protocols of quantum key agreement [PDF]

open access: yes, 2013
Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based
Alam, Nasir   +2 more
core   +1 more source

Hierarchical certificateless authenticated key agreement protocol

open access: yesTongxin xuebao, 2016
A hierarchical certificateless authenticated key agreement protocol was proposed, and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model, the security of the protocol was based on the computa-tional Diffie-Hellman assumption.
Hang SU, Jian-wei LIU, Rui TAO
doaj   +2 more sources

Questioning Key Compromise Attack on Ostad-Sharif et al.’s Authentication and Session key Generation Scheme for Healthcare Applications

open access: yesIEEE Access, 2019
Recently, Ostad-Sharif et al. pointed out the susceptibility of three different authentication schemes themed for telecare medicine/medical information systems to key compromise impersonation attack (KCIA). To further address this issue, they proposed an
Saru Kumari   +3 more
doaj   +1 more source

A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks

open access: yesIEEE Access, 2020
Certificateless public-key cryptography has conquered both the certificate management problem in the traditional public-key cryptography and the key escrow problem in the ID-based public-key cryptography. Certificateless authenticated key exchange (CLAKE)
Tsung-Che Hsieh   +2 more
doaj   +1 more source

Stronger Attacks on Causality-Based Key Agreement

open access: yes, 2016
Remarkably, it has been shown that in principle, security proofs for quantum key-distribution (QKD) protocols can be independent of assumptions on the devices used and even of the fact that the adversary is limited by quantum theory. All that is required
Salwey, Benno, Wolf, Stefan
core   +1 more source

Key agreement based on automaton groups [PDF]

open access: yesGroups Complexity Cryptology, 2019
Abstract We suggest several automaton groups as platforms for Anshel–Anshel–Goldfeld key agreement metascheme. They include Grigorchuk and universal Grigorchuk groups, Hanoi 3-towers group, the Basilica group and a subgroup of the affine group
Grigorchuk, R., Grigoriev, D.
openaire   +4 more sources

Secret Key Agreement under Discussion Rate Constraints

open access: yes, 2017
For the multiterminal secret key agreement problem, new single-letter lower bounds are obtained on the public discussion rate required to achieve any given secret key rate below the secrecy capacity.
Chan, Chung   +3 more
core   +1 more source

Adaptive authentication and key agreement mechanism for future cellular systems [PDF]

open access: yes, 2006
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core  

Server-Aided Continuous Group Key Agreement

open access: yesIACR Cryptology ePrint Archive, 2022
Continuous Group Key Agreement (CGKA) -- or Group Ratcheting -- lies at the heart of a new generation of scalable End-to-End secure (E2E) cryptographic multi-party applications.
J. Alwen   +3 more
semanticscholar   +1 more source

Cryptanalysis of group-based key agreement protocols using subgroup distance functions

open access: yes, 2007
We introduce a new approach for cryptanalysis of key agreement protocols based on noncommutative groups. This approach uses functions that estimate the distance of a group element to a given subgroup.
D. Garber   +8 more
core   +1 more source

Home - About - Disclaimer - Privacy