搜索结果: 1-15 共查到“军队指挥学 Authenticated key agreement”相关记录35条 . 查询时间(0.031 秒)
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
Key agreement scheme Anonymous multi-server Securty
2016/1/26
Chuang and Chen propose an anonymous multi server authenticated
key agreement scheme based on trust computing using smart
card, password, and biometrics. Chuang and Chen say that this scheme
not on...
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction
authenticated key agreement certificated-based cryptography public key repalcement attack
2016/1/3
Certificate-based cryptography is a new public-key cryptographic paradigm that has very appealing features, namely it simplifies the certificate management problem in traditional public key cryptograp...
Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols
Key agreement Tripartite Identitybased
2014/3/5
Key agreement allows multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. In recent years, several identity-based au...
Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol
cryptographic protocols / Authentication Certificateless cryptography
2013/2/21
Recently, He et al. (Computers and Mathematics with Applications, 2012, 64(6): 1914-1926) proposed a new efficient certificateless two-party authenticated key agreement protocol. They claimed their pr...
An efficient certificateless authenticated key agreement scheme
Certificateless cryptography Authenticated key agreement Provable security Bilinear pairings Elliptic curve
2012/3/26
Due to avoiding the key escrow problem in the identity-based cryptosystem, certificateless public key cryptosystem (CLPKC) has received a significant attention. As an important part of the CLPKC, the ...
An Improved Certificateless Authenticated Key Agreement Protocol
certificateless public key cryptography key agreement man-in-the-middle attack
2012/6/14
Recently, Mokhtarnameh, Ho, Muthuvelu proposed a certificateless key agreement protocol. In this paper, we show that their protocol is insecure against a man-in-the-middle attack which is a severe dis...
An Improved Certificateless Authenticated Key Agreement Protocol
cryptographic protocols / certificateless public key cryptography key agreement man-in-the-middle attack bilinear pairing
2012/3/20
Recently, Mokhtarnameh, Ho, Muthuvelu proposed a certificateless key agreement protocol. In this paper, we show that their protocol is insecure against a man-in-the-middle attack which is a severe dis...
An efficient certificateless authenticated key agreement protocol without bilinear pairings
Certificateless cryptography Authenticated key agreement
2011/7/25
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography.
An efficient certificateless two-party authenticated key agreement scheme from pairings
Certificateless cryptography Authenticated key agreement Provable
2011/3/11
Key agreement (KA) allows two or more users to negotiate a secret
session key among them over an open network. Authenticated key agreement
(AKA) is a KA protocol enhanced to prevent active attacks. ...
An efficient certificateless two-party authenticated key agreement scheme from pairings
Certificateless cryptography Authenticated key agreement Provable security Bilinear pairings Elliptic curve
2012/3/29
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AK...
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Information Reconciliation Privacy Amplification Fuzzy Extractors Randomness Extractors Error-Correcting Codes Biometric Authentication
2010/8/26
Consider two parties holding samples from correlated distributions W and W', respectively, that are within distance t of each other in some metric space. These parties wish to agree on a uniformly dis...
An enhanced password authenticated key agreement protocol for wireless mobile network
Password Authentication Key Agreement
2009/12/29
Password-based Authenticated Key Agreement (PAKA) protocols are widely used in wireless mobile networks, however many existing PAKA protocols have security flaws. In the 3GPP2 network, there are sever...
Cryptanalysis of Multiple-Server Password-Authenticated Key Agreement Schemes Using Smart Cards
Multiserver Password-authentication Insider Impersonation Attack DoS Attack
2009/11/18
Password-based user-authentication schemes have been widely used when users access a
server to avail internet services. Multiserver password-authentication schemes enable remote
users to obtain serv...
Cryptanalysis of a client-to-client password-authenticated key agreement protocol
Cryptanalysis EC2C-PAKA impersonate attack
2009/6/5
Recently, Byun et al. proposed an efficient client-to-client password-authenticated key agreement protocol (EC2C-PAKA), which was provably secure in a formally defined security model. This letter show...
Identity Based Authenticated Key Agreement Protocols from Pairings
Identity Based Authenticated Key Agreement Protocols Pairings
2009/4/15
We investigate a number of issues related to identity based
authenticated key agreement protocols using the Weil or Tate pairings.
These issues include how to make protocols efficient; how to avoid ...