Results 51 to 60 of about 3,103,043 (192)

Design and analysis of group key exchange protocols [PDF]

open access: yes, 2010
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security ...
Gorantla, Malakondayya Choudary
core   +1 more source

An active attack on a distributed Group Key Exchange system

open access: yes, 2016
In this work, we introduce an active attack on a Group Key Exchange protocol by Burmester and Desmedt. The attacker obtains a copy of the shared key, which is created in a collaborative manner with the legal users in a communication ...
Baouch, Mohamed   +3 more
core   +1 more source

Smooth Hash Proof System Based on the Learning With Errors Problem With Multi-Bit Key Output

open access: yesIEEE Access, 2019
Since hash proof system (HPS) can be utilized to build versatilely cryptographic schemes, the study on realizing this cryptographic primitive has been a very active research area. With the increasing concerns on the huge progress in quantum computing, it
Momeng Liu   +3 more
doaj   +1 more source

What kind of noise guarantees security for the Kirchhoff-Loop-Johnson-Noise key exchange? [PDF]

open access: yes, 2014
This article is a supplement to our recent one about the analysis of the noise properties in the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system [Gingl and Mingesz, PLOS ONE 9 (2014) e96109, doi:10.1371/journal.pone.0096109].
Gingl, Zoltan   +2 more
core   +2 more sources

Inhibition of Poly(ethylenediaminetetraacetic acid-diethanolamine) on Deposition of Calcium Sulfate Crystal in Simulated Industrial Water

open access: yesCrystals, 2020
Calcium sulfate scale is a typical deposit on the equipment pieces or pipes of an industrial water system. Scale inhibitors could obviously reduce the precipitation of calcium sulfate crystal.
Jian-Qiu Chen   +4 more
doaj   +1 more source

A new key exchange protocol based on the decomposition problem [PDF]

open access: yes, 2005
In this paper we present a new key establishment protocol based on the decomposition problem in non-commutative groups which is: given two elements $w, w_1$ of the platform group $G$ and two subgroups $A, B \subseteq G$ (not necessarily distinct), find ...
Shpilrain, Vladimir, Ushakov, Alexander
core   +2 more sources

Public Key Exchange Using Matrices Over Group Rings [PDF]

open access: yes, 2013
We offer a public key exchange protocol in the spirit of Diffie-Hellman, but we use (small) matrices over a group ring of a (small) symmetric group as the platform.
Kahrobaei, Delaram   +2 more
core   +2 more sources

Survey of braid-based cryptography

open access: yesTongxin xuebao, 2009
The achievements of braid-based cryptography were surveyed: some recently developed cryptographic schemes were introduced, including key exchange protocols enciphering-deciphering and authentication schemes.
ZHU Ping1, WEN Qiao-yan2
doaj  

A Privacy-Preserved E2E Authenticated Key Exchange Protocol for Multi-Server Architecture in Edge Computing Networks

open access: yesIEEE Access, 2020
Edge computing has played an important role in enabling 5G technology which supports a great number of connected narrow-band IoT devices. In an edge computing architecture enabled with global mobile network, edge or IoT devices are wirelessly connected ...
Chien-Lung Hsu   +4 more
doaj   +1 more source

Obfuscated Key Exchange

open access: yesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security
CCS '24: Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications ...
Günther, Felix; id_orcid0000-0002-8495-6610   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy