Results 41 to 50 of about 401,573 (156)

Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication

open access: yesIEEE Access, 2019
Group key agreement is a good way to ensure secure communication within a group. However, the identity authentication, privacy protection, and information sharing access control (different access rights may exist for different sensitivity of information)
Zhang Qikun   +5 more
doaj   +1 more source

A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment

open access: yesFuture Internet
In today’s advanced network and digital age, the Internet of Things network is experiencing a significant growing trend and, due to its wide range of services and network coverage, has been able to take a special place in today’s technology era.
Ali Peivandizadeh   +4 more
doaj   +1 more source

Authenticated commutator key agreement protocol

open access: yesGroups Complexity Cryptology, 2016
AbstractThe original commutator key agreement (CKA) protocol is a two party anonymous key agreement protocol invented by I. Anshel, M. Anshel and D. Goldfeld. In this paper we propose a modification of the CKA protocol with mutual authentication without introducing any additional computational assumptions.
openaire   +2 more sources

Efficient three-party authenticated key agreement protocol based on chaotic map

open access: yes网络与信息安全学报, 2016
Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes ...
Xiong LI   +3 more
doaj   +3 more sources

A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol

open access: yesCybernetics and Information Technologies, 2018
Cryptographic protocols are the backbone of information security. Unfortunately the security of several important components of these protocols can be neglected. This causes violation of personal privacy and threats to democracy.
Usha S., Kuppuswami S., Karthik M.
doaj   +1 more source

A New Key-Agreement-Protocol

open access: yes, 2009
A new 4-pass Key-Agreement Protocol is presented. The security of the protocol mainly relies on the existence of a (polynomial-computable) One-Way-Function and the supposed computational hardness of solving a specific system of equations.
openaire   +2 more sources

Mutual authentication quantum key agreement protocol with single-particle measurement

open access: yesFrontiers in Physics
In this paper, a mutual authentication quantum key agreement protocol with single-particle measurement is proposed. The participants can authenticate each other’s identity through their secret identity information and the entanglement property of Bell ...
Hao Yang   +4 more
doaj   +1 more source

A survey on the application of blockchain in cryptographic protocols

open access: yesCybersecurity
With the continuous development of network technology, cryptographic protocols are facing diverse and complex security challenges. Blockchain technology, as a solution incorporating decentralization, traceability, programmability, and immutability ...
Xiangyang Luo   +3 more
doaj   +1 more source

Energy Efficient ECC Authenticated Key Exchange Protocol for Star Topology Wireless Sensor Networks

open access: yesJournal of Telecommunications and Information Technology
The article proposes a new energy-efficient protocol designed for star topology wireless sensor networks. The protocol has been implemented using ECC, although it can be easily adapted to any algebraic structure, where the discrete logarithm problem is ...
Andrzej Chmielowiec   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy