Results 71 to 80 of about 12,317,693 (236)
Attribute-based authenticated key agreement protocol supporting revocation
Revocation is a crucial issue for the practical use of attribute-based authenticated key agreement (ABAKA) protocols. A new ABAKA protocol supporting revocation was proposed.
Qiang LI, Deng-guo FENG, Li-wu ZHANG
doaj +2 more sources
Cryptanalysis of a multi-party quantum key agreement protocol with single particles
Recently, Sun et al. [Quant Inf Proc DOI: 10.1007/s11128-013-0569-x] presented an efficient multi-party quantum key agreement (QKA) protocol by employing single particles and unitary operations.
Gao, Fei +4 more
core +1 more source
Key Agreement Using Statically Keyed Authenticators [PDF]
A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. Application of the authenticators to Diffie-Hellman variants in appropriate groups leads to authenticated key agreement protocols which have attractive properties in comparison ...
Boyd, Colin +2 more
openaire +2 more sources
The security of mobile communication largely depends on the strength of the authentication key exchange protocol. The 3rd Generation Partnership Project (3GPP) Group has standardized the 5G AKA (Authentication and Key Agreement) protocol for the next ...
An Braeken +3 more
doaj +1 more source
Communication Complexity of the Secret Key Agreement in Algorithmic Information Theory
It is known that the mutual information, in the sense of Kolmogorov complexity, of any pair of strings x and y is equal to the length of the longest shared secret key that two parties can establish via a probabilistic protocol with interaction on a ...
Gürpınar, Emirhan +1 more
core
A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials.
Tian-Fu Lee
doaj +1 more source
The Sender-Excited Secret Key Agreement Model: Capacity, Reliability and Secrecy Exponents
We consider the secret key generation problem when sources are randomly excited by the sender and there is a noiseless public discussion channel. Our setting is thus similar to recent works on channels with action-dependent states where the channel state
Chou, Tzu-Han +2 more
core +1 more source
Concurrent Two-Party Key Exchange With Forward Unlinkability in Internet of Drones
By the drone capturing attacks, the adversaries can extract the long-term secret keys stored in the drones. Therefore, it is necessary to consider forward secrecy and forward unlinkability to minimize the damage by the drone capturing attacks.
Jae Yeol Jeong +2 more
doaj +1 more source
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings [PDF]
This paper studies the relationships between the traditional Diffie-Hellman key agreement protocol and the identity-based (ID-based) key agreement protocol from pairings.
Wang, Shengbao
core +2 more sources
Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication
We investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate.
Oohama, Yasutada, Watanabe, Shun
core +2 more sources

