Results 61 to 70 of about 12,317,693 (236)

Enhancing the Security: A Lightweight Authentication and Key Agreement Protocol for Smart Medical Services in the IoHT

open access: yesMathematics, 2023
The Internet of Things (IoT) has witnessed significant growth with advancements in Internet and wireless technologies. In the medical field, the Internet of Health Things (IoHT) has emerged as an extension of the IoT, enabling the exchange of remote data
Tsu-Yang Wu   +2 more
doaj   +1 more source

Impossibility of Growing Quantum Bit Commitments [PDF]

open access: yes, 2011
Quantum key distribution (QKD) is often, more correctly, called key growing. Given a short key as a seed, QKD enables two parties, connected by an insecure quantum channel, to generate a secret key of arbitrary length.
Hengl, Stefan   +3 more
core   +1 more source

Key agreement from weak bit agreement [PDF]

open access: yesProceedings of the thirty-seventh annual ACM symposium on Theory of computing, 2005
Assume that Alice and Bob, given an authentic channel, have a protocol where they end up with a bit SA and SB, respectively, such that with probability 1+e/2 these bits are equal. Further assume that conditioned on the event SA =n SB no polynomial time bounded algorithm can predict the bit better than with probability 1-δ/2.
openaire   +1 more source

Neural Key Agreement Protocol with Extended Security

open access: yesApplied Sciences
Key agreement protocols based on neural synchronization with Tree Parity Machines (TPMs) offer promising security advantages: they do not rely on trapdoor functions, making them resistant to quantum attacks, and they avoid the need for specialized ...
Mihail-Iulian Pleşa   +2 more
doaj   +1 more source

A New Secret key Agreement Scheme in a Four-Terminal Network

open access: yes, 2011
A new scenario for generating a secret key and two private keys among three Terminals in the presence of an external eavesdropper is considered. Terminals 1, 2 and 3 intend to share a common secret key concealed from the external eavesdropper (Terminal 4)
Aref, Mohammad Reza   +2 more
core   +1 more source

Linking Classical and Quantum Key Agreement: Is There "Bound Information"? [PDF]

open access: yes, 2000
After carrying out a protocol for quantum key agreement over a noisy quantum channel, the parties Alice and Bob must process the raw key in order to end up with identical keys about which the adversary has virtually no information.
A. D. Wyner   +25 more
core   +5 more sources

Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees

open access: yesIACR Cryptology ePrint Archive, 2021
Secure group messaging protocols, providing end-to-end encryption for group communication, need to handle mobile devices frequently being offline, group members being added or removed, and the possibility of device compromises during long-lived chat ...
M. Weidner   +3 more
semanticscholar   +1 more source

Lightweight One-to-Many User-to-Sensors Authentication and Key Agreement

open access: yesInformation
The proliferation of Internet of Things (IoT) deployments demands Authentication and Key Agreement (AKA) protocols that scale from one initiator to many devices while preserving strong security guarantees on constrained hardware. Prior lightweight one-to-
Hussein El Ghor   +4 more
doaj   +1 more source

Non-abelian key agreement protocols

open access: yesDiscrete Applied Mathematics, 2003
An axiomatic description of the Diffie-Hellman key agreement protocol is presented. As examples the authors describe protocols based on known hard problems from group theory; e.g. the conjugacy problem in infinite non-Abelian groups (proven to be unsolvable in some cases).
Anshel, Iris   +2 more
openaire   +1 more source

Key control in key agreement protocols

open access: yesElectronics Letters, 1998
Certain key establishment protocols specified in an international standard and a draft international standard are considered. These protocols are all intended to provide joint key control, i.e. the protocols are designed to prevent either party choosing the key value. It is shown that this claim is suspect for most of the protocols concerned.
Mitchell, Chris J   +2 more
openaire   +9 more sources

Home - About - Disclaimer - Privacy