Results 41 to 50 of about 401,573 (156)
Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication
Group key agreement is a good way to ensure secure communication within a group. However, the identity authentication, privacy protection, and information sharing access control (different access rights may exist for different sensitivity of information)
Zhang Qikun +5 more
doaj +1 more source
In today’s advanced network and digital age, the Internet of Things network is experiencing a significant growing trend and, due to its wide range of services and network coverage, has been able to take a special place in today’s technology era.
Ali Peivandizadeh +4 more
doaj +1 more source
Authenticated commutator key agreement protocol
AbstractThe original commutator key agreement (CKA) protocol is a two party anonymous key agreement protocol invented by I. Anshel, M. Anshel and D. Goldfeld. In this paper we propose a modification of the CKA protocol with mutual authentication without introducing any additional computational assumptions.
openaire +2 more sources
Efficient three-party authenticated key agreement protocol based on chaotic map
Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes ...
Xiong LI +3 more
doaj +3 more sources
A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol
Cryptographic protocols are the backbone of information security. Unfortunately the security of several important components of these protocols can be neglected. This causes violation of personal privacy and threats to democracy.
Usha S., Kuppuswami S., Karthik M.
doaj +1 more source
A new 4-pass Key-Agreement Protocol is presented. The security of the protocol mainly relies on the existence of a (polynomial-computable) One-Way-Function and the supposed computational hardness of solving a specific system of equations.
openaire +2 more sources
Mutual authentication quantum key agreement protocol with single-particle measurement
In this paper, a mutual authentication quantum key agreement protocol with single-particle measurement is proposed. The participants can authenticate each other’s identity through their secret identity information and the entanglement property of Bell ...
Hao Yang +4 more
doaj +1 more source
A survey on the application of blockchain in cryptographic protocols
With the continuous development of network technology, cryptographic protocols are facing diverse and complex security challenges. Blockchain technology, as a solution incorporating decentralization, traceability, programmability, and immutability ...
Xiangyang Luo +3 more
doaj +1 more source
Energy Efficient ECC Authenticated Key Exchange Protocol for Star Topology Wireless Sensor Networks
The article proposes a new energy-efficient protocol designed for star topology wireless sensor networks. The protocol has been implemented using ECC, although it can be easily adapted to any algebraic structure, where the discrete logarithm problem is ...
Andrzej Chmielowiec +2 more
doaj +1 more source
5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy. [PDF]
You I +5 more
europepmc +1 more source

