Results 21 to 30 of about 401,573 (156)

Ironwood meta key agreement and authentication protocol

open access: yesAdvances in Mathematics of Communications, 2021
Number theoretic public-key solutions, currently used in many applications worldwide, will be subject to various quantum attacks, making them less attractive for longer-term use. Certain group theoretic constructs are now showing promise in providing quantum-resistant cryptographic primitives, and may provide suitable alternatives for those looking to ...
Anshel, Iris   +3 more
openaire   +4 more sources

Key agreement protocol in infinite semigroup representation level

open access: yesLietuvos Matematikos Rinkinys, 2007
Matrix decomposition problem over integer ring is presented. Solving methods are discussed and it is showed, that this problem is hard computational problem regard to computer memory resources.
Artūras Katvickis   +2 more
doaj   +1 more source

Multiparty key agreement protocols

open access: yesIEE Proceedings - Computers and Digital Techniques, 2000
A class of multiparty key agreement protocols based on secret sharing is presented. The trust infrastructure necessary to achieve the intended security goals is discussed. Entity authentication is suggested to be replaced by a less expensive group authentication. Two key agreement protocols are discussed.
Pieprzyk, J., Li, C. H.
openaire   +3 more sources

Enhanced Wireless Sensor Network Authentication Key Agreement Protocol [PDF]

open access: yesJisuanji gongcheng
Security of data transmission is one of the most significant security threats faced by Wireless Sensor Network (WSN), for which the Authentication Key Agreement (AKA) protocol is an effective solution.
DENG Miaolei, MA Qingyu, SONG Qing, ZHANG Chunyan, ZUO Zhibin
doaj   +1 more source

Quantum key agreement protocol

open access: yesElectronics Letters, 2004
By replacing a classical channel with a quantum one during quantum teleportation, a quantum key agreement protocol is presented. The key bits are determined only by the random measurement outcomes and are independent of the states transmitted over the channel.
N. Zhou, G. Zeng, J. Xiong
openaire   +1 more source

Key control in key agreement protocols

open access: yesElectronics Letters, 1998
Certain key establishment protocols specified in an international standard and a draft international standard are considered. These protocols are all intended to provide joint key control, i.e. the protocols are designed to prevent either party choosing the key value. It is shown that this claim is suspect for most of the protocols concerned.
Mitchell, Chris J   +2 more
openaire   +9 more sources

Automated Verification of Group Key Agreement Protocols [PDF]

open access: yes2014 IEEE Symposium on Security and Privacy, 2014
We advance the state-of-the-art in automated symbolic cryptographic protocol analysis by providing the first algorithm that can handle Diffie-Hellman exponentiation, bilinear pairing, and AC-operators. Our support for AC-operators enables protocol specifications to use multisets, natural numbers, and finite maps.
Schmidt, B   +3 more
openaire   +1 more source

MULTIPARTY KEY AGREEMENT PROTOCOL BASED ON SYMMETRIC TECHNIQUES [PDF]

open access: yesCommunications of the Korean Mathematical Society, 2003
Summary: We propose multiparty key agreement protocols by generalizing the Blom's scheme based on \(2\) variable polynomials. Especially we develop three party and four party key agreement schemes with security. The advantage of the new schemes is to have small demands on storage space.
Lee, Hyang-Sook   +2 more
openaire   +3 more sources

Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme

open access: yesIEEE Access, 2023
One of the fundamental construction blocks in safeguarding group communications is group key establishment protocols. Group key agreement protocols are more suitable for distributed environments where the participant from various places can agree upon ...
Rolla Subrahmanyam   +2 more
doaj   +1 more source

Towards a Provably Secure Authentication Protocol for Fog-Driven IoT-Based Systems

open access: yesApplied Sciences, 2023
The emergence of fog-based Internet of Things (IoT) systems have played a significant role in enhancing the applicability of the IoT paradigm. In such systems, fog-nodes are proficient enough to retain, process and transmit the data coming from IoT ...
Minahil Rana   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy