Results 11 to 20 of about 401,573 (156)
Improved Framework for Blockchain Application Using Lattice Based Key Agreement Protocol [PDF]
One of the most recent challenges in communication system and network system is the privacy and security of information and communication session. Blockchain is one of technologies that use in sensing application in different important environments such ...
Zahraa Ch. Oleiwi +2 more
doaj +1 more source
Post-quantum identity-based authenticated multiple key agreement protocol
Authenticated multiple key agreement (AMKA) protocols provide participants with multiple session keys after one round of authentication. Many schemes use Diffie-Hellman or authenticated key agreement schemes that rely on hard integer factorizations that ...
Yang Yang +3 more
doaj +1 more source
A Lightweight Authentication Protocol for UAVs Based on ECC Scheme
With the rapid development of unmanned aerial vehicles (UAVs), often referred to as drones, their security issues are attracting more and more attention.
Shuo Zhang +3 more
doaj +1 more source
An Improved Key Agreement Protocol Based on Fractal Theory [PDF]
A key agreement protocol is a key establishment technique which enables two or more communicating parities to agree on a key or exchange information over an open communication channel.
Nadia M. G. Al-Saidi
doaj +1 more source
Key Agreement via Protocols [PDF]
Inspired by the ideas of no cloning and measurable degrading that quantum key agreement protocols rely on, we devise novel key agreement protocols for the classical world. Our protocols are based on identical devices that are mass produced and distributed among parties participating in the protocol.
Roscoe, A, Wang, L
openaire +2 more sources
Reusing Static Keys in Key Agreement Protocols [PDF]
Contrary to conventional cryptographic wisdom, the NIST SP 800-56A standard explicitly allows the use of a static key pair in more than one of the key establishment protocols described in the standard. In this paper, we give examples of key establishment protocols that are individually secure, but which are insecure when static key pairs are reused in ...
Chatterjee, Sanjit +2 more
openaire +2 more sources
Multi-parties key agreement protocol based on elliptic curve
The key agreement protocol is a shared key mechanism between two or more participants in a public channel.A multi key agreement protocol based on elliptic curve was designed by using the secure one-way function.The protocol was based on password ...
Long GAO,Chun-ming TANG +1 more
doaj +3 more sources
Non-abelian key agreement protocols
An axiomatic description of the Diffie-Hellman key agreement protocol is presented. As examples the authors describe protocols based on known hard problems from group theory; e.g. the conjugacy problem in infinite non-Abelian groups (proven to be unsolvable in some cases).
Anshel, Iris +2 more
openaire +1 more source
Voice over Internet Protocol (VoIP) has been recently one of the more popular applications in Internet technology. It benefits lower cost of equipment, operation, and better integration with data applications than voice communications over telephone ...
Asma Jebrane +3 more
doaj +1 more source
INAKA: Improved Authenticated Key Agreement Protocol Based on Newhope
The Newhope scheme is one of the milestones of the study in key agreement protocol but it lacks the anti-active-attack capability. In this article, we propose a mutual authenticated key agreement scheme named INAKA scheme based on the commitment value ...
Yatao Yang +5 more
doaj +1 more source

