Results 71 to 80 of about 12,317,693 (236)

Attribute-based authenticated key agreement protocol supporting revocation

open access: yesTongxin xuebao, 2014
Revocation is a crucial issue for the practical use of attribute-based authenticated key agreement (ABAKA) protocols. A new ABAKA protocol supporting revocation was proposed.
Qiang LI, Deng-guo FENG, Li-wu ZHANG
doaj   +2 more sources

Cryptanalysis of a multi-party quantum key agreement protocol with single particles

open access: yes, 2013
Recently, Sun et al. [Quant Inf Proc DOI: 10.1007/s11128-013-0569-x] presented an efficient multi-party quantum key agreement (QKA) protocol by employing single particles and unitary operations.
Gao, Fei   +4 more
core   +1 more source

Key Agreement Using Statically Keyed Authenticators [PDF]

open access: yes, 2004
A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. Application of the authenticators to Diffie-Hellman variants in appropriate groups leads to authenticated key agreement protocols which have attractive properties in comparison ...
Boyd, Colin   +2 more
openaire   +2 more sources

Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks

open access: yesIEEE Access, 2019
The security of mobile communication largely depends on the strength of the authentication key exchange protocol. The 3rd Generation Partnership Project (3GPP) Group has standardized the 5G AKA (Authentication and Key Agreement) protocol for the next ...
An Braeken   +3 more
doaj   +1 more source

Communication Complexity of the Secret Key Agreement in Algorithmic Information Theory

open access: yes, 2020
It is known that the mutual information, in the sense of Kolmogorov complexity, of any pair of strings x and y is equal to the length of the longest shared secret key that two parties can establish via a probabilistic protocol with interaction on a ...
Gürpınar, Emirhan   +1 more
core  

Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks

open access: yesSensors, 2015
A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials.
Tian-Fu Lee
doaj   +1 more source

The Sender-Excited Secret Key Agreement Model: Capacity, Reliability and Secrecy Exponents

open access: yes, 2013
We consider the secret key generation problem when sources are randomly excited by the sender and there is a noiseless public discussion channel. Our setting is thus similar to recent works on channels with action-dependent states where the channel state
Chou, Tzu-Han   +2 more
core   +1 more source

Concurrent Two-Party Key Exchange With Forward Unlinkability in Internet of Drones

open access: yesIEEE Access
By the drone capturing attacks, the adversaries can extract the long-term secret keys stored in the drones. Therefore, it is necessary to consider forward secrecy and forward unlinkability to minimize the damage by the drone capturing attacks.
Jae Yeol Jeong   +2 more
doaj   +1 more source

On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings [PDF]

open access: yes, 2009
This paper studies the relationships between the traditional Diffie-Hellman key agreement protocol and the identity-based (ID-based) key agreement protocol from pairings.
Wang, Shengbao
core   +2 more sources

Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication

open access: yes, 2010
We investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate.
Oohama, Yasutada, Watanabe, Shun
core   +2 more sources

Home - About - Disclaimer - Privacy