搜索结果: 1-15 共查到“密码学 Establishment”相关记录27条 . 查询时间(0.015 秒)
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs
Password Authentication VANET Group-Key generation
2019/9/19
Vehicular Ad-hoc Networks (VANETs) are a cardinal part of intelligent transportation system (ITS) which render various services in terms of traffic and transport management. The VANET is used to manag...
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
channel establishment ACCE mutli-stage
2019/5/5
The Noise protocol framework is a suite of channel establishment protocols, of which each individual protocol ensures various security properties of the transmitted messages, but keeps specification, ...
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
applied cryptography provable security TLS
2019/4/29
Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of interactions...
An Isogeny-Based Password-Authenticated Key Establishment Protocol
isogeny-based cryptography password-authenticated key establishment
2018/11/13
Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties who share a low-entropy secret (a password) to securely establish cryptographic keys in the absence...
Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol
Post-quantum cryptography isogeny-based cryptography authenticated key establishment
2018/3/26
We propose a security model for authenticated key establishment in the quantum setting. Our model is the first for authenticated key establishment that allows for quantum superpositions of queries. Th...
One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks
Key establishment bilinear pairings Session key
2016/1/26
The article proposes one-pass authenticated key establishment protocol
in random oracles for Wireless Sensor Networks. Security of the protocol relies on
Computational Diffie-Hellman Problem on Bili...
Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks
Sensor Networks Key Establishment
2014/3/6
The article proposes a provably secure authenticated multiple key establishment protocol for Wireless Sensor Network. Security of the protocol is based on the computational infeasiblity of solving Ell...
Analysis of authentication and key establishment in inter-generational mobile telephony
wireless network protocol authentication protocol
2014/3/13
Second (GSM), third (UMTS), and fourth-generation (LTE) mobile telephony protocols are all in active use, giving rise to a number of interoperation situations. Although the standards address roaming b...
With over 1.5~billion debit and credit cards in use worldwide, the EMV system (a.k.a. ``Chip-and-PIN'') has become one of the most important deployed cryptographic protocol suites. Recently, the EMV c...
Cryptanalysis of three matrix-based key establishment protocols
a matrix-based key transport protocol Baumslag Camps
2011/2/23
We cryptanalyse a matrix-based key transport protocol due to Baumslag, Camps, Fine, Rosenberger and Xu from 2006. We also cryptanalyse two recently proposed matrix-based key agreement protocols, due t...
We cryptanalyse a matrix-based key transport protocol due to Baumslag, Camps, Fine, Rosenberger and Xu from 2006. We also cryptanalyse two recently proposed matrix-based key agreement protocols, due t...
A Reflection on the Security of Two-Party Key Establishment Protocols
key establishment key authentication entity authentication
2010/4/7
Two-party key establishment has been a very fruitful research area
in cryptography, with many security models and numerous protocols proposed.
In this paper, we take another look at the YAK protocol...
On the Connection between Signcryption and One-pass Key Establishment
One Pass Key establishment Signcryption Signcryption KEM
2009/9/11
Key establishment between two parties that uses only one message transmission is referred
to as one-pass key establishment (OPKE). OPKE provides the opportunity for very efficient constructions,
eve...
Three Improved Algorithms for Multi-path Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission
sensor network key establishment secure message transmission
2009/9/2
In this paper, we propose a security model to capture active attacks against multi-path key establishment (MPKE) in sensor networks. Our model strengthens previous models to capture more attacks and a...
Scalable Compilers for Group Key Establishment : Two/Three Party to Group
Group Key Exchange Compilers Tree Based Group Key Exchange Circular topology
2009/6/12
This work presents the first scalable, efficient and generic compilers to construct group key
exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose
three diffe...