搜索结果: 1-14 共查到“军事学 authenticated key agreement protocol”相关记录14条 . 查询时间(0.066 秒)
Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol
cryptographic protocols / Authentication Certificateless cryptography
2013/2/21
Recently, He et al. (Computers and Mathematics with Applications, 2012, 64(6): 1914-1926) proposed a new efficient certificateless two-party authenticated key agreement protocol. They claimed their pr...
An Improved Certificateless Authenticated Key Agreement Protocol
certificateless public key cryptography key agreement man-in-the-middle attack
2012/6/14
Recently, Mokhtarnameh, Ho, Muthuvelu proposed a certificateless key agreement protocol. In this paper, we show that their protocol is insecure against a man-in-the-middle attack which is a severe dis...
An Improved Certificateless Authenticated Key Agreement Protocol
cryptographic protocols / certificateless public key cryptography key agreement man-in-the-middle attack bilinear pairing
2012/3/20
Recently, Mokhtarnameh, Ho, Muthuvelu proposed a certificateless key agreement protocol. In this paper, we show that their protocol is insecure against a man-in-the-middle attack which is a severe dis...
An efficient certificateless authenticated key agreement protocol without bilinear pairings
Certificateless cryptography Authenticated key agreement
2011/7/25
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography.
An enhanced password authenticated key agreement protocol for wireless mobile network
Password Authentication Key Agreement
2009/12/29
Password-based Authenticated Key Agreement (PAKA) protocols are widely used in wireless mobile networks, however many existing PAKA protocols have security flaws. In the 3GPP2 network, there are sever...
Cryptanalysis of a client-to-client password-authenticated key agreement protocol
Cryptanalysis EC2C-PAKA impersonate attack
2009/6/5
Recently, Byun et al. proposed an efficient client-to-client password-authenticated key agreement protocol (EC2C-PAKA), which was provably secure in a formally defined security model. This letter show...
Pairing-Based Two-Party Authenticated Key Agreement Protocol
Pairing-Based Two-Party Authenticated Key Agreement Protocol
2009/3/9
authenticated by each other and agree on a secret session key by
exchanging messages over an insecure channel. In this paper, based on the
bilinear pairing, we present a new two-party authenticated ...
A New Efficient ID-Based Authenticated Key Agreement Protocol
ID-Based Key Agreement Key Compromise Impersonation
2009/3/3
Recently Eun-Kyung Ryu, Eun-Jun Yoon, and Kee-Young Yoo pro-
posed an efficient ID-based authenticated key agreement with paring[11].
They argued that it is secure and efficient. In this paper, we s...
Efficient Identity-Based and Authenticated Key Agreement Protocol
Efficient Identity-Based Authenticated Key Agreement Protocol
2009/1/23
Several identity based and authenticated key agreement protocols have been proposed in
recent years and all of them have been shown to be non-secure. It remains an open question
to design secure ide...
Chameleon-Based Deniable Authenticated Key Agreement Protocol
Chameleon Deniability Authentication Key Agreement
2008/12/18
As a useful means of safeguarding privacy of communications, deniable authentication has received much attention. A Chameleon-based deniable authenticated key agreement protocol is presented in this ...
An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol
One-round Tripartite Authenticated Key Agreement Protocol
2008/9/3
A tripartite authenticated key agreement protocol is generally
designed to accommodate the need of three specific entities in communicating
over an open network with a shared secret key, which is us...
An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol
One-Round ID-Based Tripartite Authenticated Key Agreement Protocol
2008/8/27
A tripartite authenticated key agreement protocol is gen-
erally designed to accommodate the need of three specic entities in
communicating over an open network with a shared secret key, which
is ...
Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode
Authenticated key agreement Perfect forward secrecy Bilinear pairing
2008/5/30
There are several essential features in key agreement protocols such
as key escrow (essential when confidentiality, audit trail and legal interception
are required) and perfect forward secrecy (i.e....
Cryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement Protocol
Cryptanalytic Flaws ID-Based Authenticated Key Protocol
2008/5/23
A key agreement protocol is designed for two or more
entities to agree upon a shared secret key, which is used
to preserve confidentiality and data integrity over an open
network. In 2007, Oh et al...