Results 61 to 70 of about 12,317,693 (236)
The Internet of Things (IoT) has witnessed significant growth with advancements in Internet and wireless technologies. In the medical field, the Internet of Health Things (IoHT) has emerged as an extension of the IoT, enabling the exchange of remote data
Tsu-Yang Wu +2 more
doaj +1 more source
Impossibility of Growing Quantum Bit Commitments [PDF]
Quantum key distribution (QKD) is often, more correctly, called key growing. Given a short key as a seed, QKD enables two parties, connected by an insecure quantum channel, to generate a secret key of arbitrary length.
Hengl, Stefan +3 more
core +1 more source
Key agreement from weak bit agreement [PDF]
Assume that Alice and Bob, given an authentic channel, have a protocol where they end up with a bit SA and SB, respectively, such that with probability 1+e/2 these bits are equal. Further assume that conditioned on the event SA =n SB no polynomial time bounded algorithm can predict the bit better than with probability 1-δ/2.
openaire +1 more source
Neural Key Agreement Protocol with Extended Security
Key agreement protocols based on neural synchronization with Tree Parity Machines (TPMs) offer promising security advantages: they do not rely on trapdoor functions, making them resistant to quantum attacks, and they avoid the need for specialized ...
Mihail-Iulian Pleşa +2 more
doaj +1 more source
A New Secret key Agreement Scheme in a Four-Terminal Network
A new scenario for generating a secret key and two private keys among three Terminals in the presence of an external eavesdropper is considered. Terminals 1, 2 and 3 intend to share a common secret key concealed from the external eavesdropper (Terminal 4)
Aref, Mohammad Reza +2 more
core +1 more source
Linking Classical and Quantum Key Agreement: Is There "Bound Information"? [PDF]
After carrying out a protocol for quantum key agreement over a noisy quantum channel, the parties Alice and Bob must process the raw key in order to end up with identical keys about which the adversary has virtually no information.
A. D. Wyner +25 more
core +5 more sources
Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees
Secure group messaging protocols, providing end-to-end encryption for group communication, need to handle mobile devices frequently being offline, group members being added or removed, and the possibility of device compromises during long-lived chat ...
M. Weidner +3 more
semanticscholar +1 more source
Lightweight One-to-Many User-to-Sensors Authentication and Key Agreement
The proliferation of Internet of Things (IoT) deployments demands Authentication and Key Agreement (AKA) protocols that scale from one initiator to many devices while preserving strong security guarantees on constrained hardware. Prior lightweight one-to-
Hussein El Ghor +4 more
doaj +1 more source
Non-abelian key agreement protocols
An axiomatic description of the Diffie-Hellman key agreement protocol is presented. As examples the authors describe protocols based on known hard problems from group theory; e.g. the conjugacy problem in infinite non-Abelian groups (proven to be unsolvable in some cases).
Anshel, Iris +2 more
openaire +1 more source
Key control in key agreement protocols
Certain key establishment protocols specified in an international standard and a draft international standard are considered. These protocols are all intended to provide joint key control, i.e. the protocols are designed to prevent either party choosing the key value. It is shown that this claim is suspect for most of the protocols concerned.
Mitchell, Chris J +2 more
openaire +9 more sources

