• No results found

secure secret-key agreement protocols

Performance Analysis of Key Establishment Protocols for Secure System

Performance Analysis of Key Establishment Protocols for Secure System

... of secret information, known as a shared session key, that is fresh and unique for each ...of secure communications can be accomplished, provided that shared session keys are readily available to ...

5

Constructing UC Secure and Constant Round Group Key Exchange Protocols via Secret Sharing

Constructing UC Secure and Constant Round Group Key Exchange Protocols via Secret Sharing

... group key agreement protocols, one is based on the BD scheme which was proposed by Burmester and Desmedt [13], and the other is based on secret sharing ...group key exchange schemes ...

9

Secret-Key and Public-Key Based Privacy Protection Protocols in Wireless Medical Sensor Networks: A Survey

Secret-Key and Public-Key Based Privacy Protection Protocols in Wireless Medical Sensor Networks: A Survey

... a secure key agreement protocol to set up shared keys between sensor nodes and base stations, and (3) symmetric encryption/decryption for protecting data confidentiality and ...

5

Authenticated Group Key Agreement Protocols for Error Detection and Correction

Authenticated Group Key Agreement Protocols for Error Detection and Correction

... new secret and distributes it to each member encrypted below the long-run pair-wise key it shares thereupon ...a secure channel with every incoming ...

6

Secure Group Key Transfer Protocol Based on Secret Sharing

Secure Group Key Transfer Protocol Based on Secret Sharing

... a key establishment protocol needs to distribute one-time secret session keys to all participating ...The key establishment protocol also needs to provide confidentiality and authentication for ...

6

On the Security of Authenticated Group Key Agreement Protocols

On the Security of Authenticated Group Key Agreement Protocols

... long-term key of one participant should not enable the impersonation of any other ...and key compromise impersonation resilience (KCIR) for GKA protocols to take into account authenticated key ...

8

Authenticated Key Agreement Protocols:  A Comparative Study

Authenticated Key Agreement Protocols: A Comparative Study

... provides secure communications in client—server environment through a low power computing Portable devices such as PDAs,smart cards, and cellular phones and make the client perform as minor computations as ...

9

Group key agreement protocols with implicit key authentication

Group key agreement protocols with implicit key authentication

... on secure group communication over unsecured channels such as the Internet and Ad Hoc ...share secret keys within the ...the key sharing process without valid ...other secure communication ...

12

Cryptanalysis  of  Three  Certificate-Based  Authenticated  Key  Agreement  Protocols   and  a  Secure  Construction

Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction

... public key cryptography (CL-PKC). Their main purpose is to solve the key escrow problem in IBC, while keeping the implicit authentication property of ...private key by combining the partial private ...

19

Public-Key  Encryption  with  Lazy  Parties

Public-Key Encryption with Lazy Parties

... is secure in the ...a key-agreement protocol to share a random string between them so that the shared string will be uniformly random if at least one of them chooses good one in the ...

18

Providing A Forward Secure Authentication and Key Agreement Protocol for UMTS

Providing A Forward Secure Authentication and Key Agreement Protocol for UMTS

... Actually, the commercial kinds of these false base stations exist that are called IMSI catcher too (Fox, 2002) and has all features of an authorized base station. These false base stations are capable of introducing ...

8

Weakness  of  Several  Identity-based  Tripartite  Authenticated  Key  Agreement  Protocols

Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols

... authenticated key agreement protocols. We show that these protocols do not possess the desirable security ...the protocols neither to repair the security flaws, but simply to show by ...

8

Accomplish Secure Handover Session Key Management through Portable Relay in LTE Advanced Networks

Accomplish Secure Handover Session Key Management through Portable Relay in LTE Advanced Networks

... In 2015,Zhenyu Zhou,Mianxiong Dong, Kaoru Ota,GuojunWang had published a “Energy-Efficient Resource Allocation for D2D Communications Underlaying Cloud-RAN based LTE-A Networks”.Device-to-device (D2D) communication is a ...

9

Secure Group Key Agreement Algorithm for Mobile Adhoc Networks

Secure Group Key Agreement Algorithm for Mobile Adhoc Networks

... group key agreement with an arbitrary connectivity graph, where each user is only aware of his neighbours and has no information about the existence of other ...group key more efficiently than just ...

11

Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols

Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols

... of key agreement pro- tocols are key agreement protocols for multi-party ...multi-party key agreement protocols are tripartite (or three-party) protocols, ...

10

Secure Secret Key (SSK) Generation Algorithm for Multimedia Multicast Networks

Secure Secret Key (SSK) Generation Algorithm for Multimedia Multicast Networks

... for secure group communications‖ Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC‘04) 0-7695-2108-8/04 © 2004 ...

6

A  Certificateless  Multiple-key  Agreement  Protocol  Based  on  Bilinear  Pairings

A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings

... multiple-key agreement protocol with bilinear ...certificateless key agreement protocols and many multiple-key agreement protocols have independently been proposed ...

7

Provably  Secure  Distance-Bounding:  an  Analysis  of  Prominent  Protocols

Provably Secure Distance-Bounding: an Analysis of Prominent Protocols

... the secret key in order to aid the adversary, but not if this information is directly useful to the adversary in future authentication ...the secret key shared between the reader and the ...

25

A Survey on Group Key Agreement with Local Connectivity

A Survey on Group Key Agreement with Local Connectivity

... secrete key between two or more parties in secure ...as key agreement. That secrete key is also called as session ...the protocols assumes a complete group of connectivity which ...

6

Authentication using Secure Node Signature Verification Algorithm with Quantum Cryptography

Authentication using Secure Node Signature Verification Algorithm with Quantum Cryptography

... Now a days, all users preferring portable devices like mobile, PDA, Laptop, etc for their communication. Recently, quantum technologies have been used for faster communication. In wired communication, user replaces ...

5

Show all 10000 documents...

Related subjects