搜索结果: 1-15 共查到“军事学 Key Agreement Protocols”相关记录34条 . 查询时间(0.116 秒)
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction
authenticated key agreement certificated-based cryptography public key repalcement attack
2016/1/3
Certificate-based cryptography is a new public-key cryptographic paradigm that has very appealing features, namely it simplifies the certificate management problem in traditional public key cryptograp...
Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols
Key agreement Tripartite Identitybased
2014/3/5
Key agreement allows multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. In recent years, several identity-based au...
Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol
agreement protocols Multiple-key agreement protocols Signature schemes
2012/6/14
Multiple key agreement protocols produce several session keys instead of one session key. Most of the multiple key agreement protocols do not utilize the hash functions in the signature schemes used f...
Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol
cryptographic protocols / agreement protocols Multiple-key agreement protocols Signature schemes
2012/3/22
Multiple key agreement protocols produce several session keys instead of one session key. Most of the multiple key agreement protocols do not utilize the hash functions in the signature schemes used f...
Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol
cryptographic protocols / agreement protocols Multiple-key agreement protocols Signature schemes
2012/3/21
Multiple key agreement protocols produce several session keys instead of one session key. Most of the multiple key agreement protocols do not utilize the hash functions in the signature schemes used f...
Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices
ID-based Mutual authentication Key agreement Elliptic curve Cryptosystem
2010/11/26
Recently, Yoon et al. and Wu proposed two improved remote mutual authentication and key agreement schemes for mobile devices on elliptic curve cryptosystem. In this paper, we show that Yoon et al.’s p...
Key Agreement Protocols Based on Multivariate Polynomials over Fq
key agreement protocol multivariate polynomials Grö bner bases NP complete problems finite field
2010/10/14
In this paper we propose new key agreement protocols based on multivariate polynomials over finite field Fq. We concretely generate the multivariate polynomial F(X)\in Fq[x1,..,xn] such that F(X)=\sum...
Key Agreement Protocols Using Multivariate Equations on Non-commutative Ring
key agreement protocol multivariate equations Grö bner bases NP complete problems non-commutative ring
2010/9/1
In this paper we propose two KAP(key agreement protocols) using multivariate equations. As the enciphering functions we select the multivariate functions of high degree on non-commutative ring H over ...
Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring
key agreement protocol multivariable algebraic equation Grö bner bases NP complete problems quaternion
2010/7/14
In this paper we propose new key agreement protocols based on multivariate algebraic equations. We choose the multivariate function F(X) of high degree on non-commutative quaternion ring H over finite...
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols
Postponed ephemeral keys pseudo-static keys tripartite key agreement
2009/9/2
We propose an new one-round implicitly authenticated three-party protocol that ex-
tends Joux's protocol as well as a two-party identity-based protocol. Our protocols have a single
communication rou...
Choo, Boyd & Hitchcock compared four well-known indistinguishability-based proof models for key agreement protocols
cryptography key agreement protocol proof model
2009/6/10
In 2005, Choo, Boyd & Hitchcock compared four well-known
indistinguishability-based proof models for key agreement protocols, which contains
the Bellare & Rogaway (1993, 1995) model, the Bellare , P...
Breaking One-Round Key-Agreement Protocols in the Random Oracle Model
One-Round Key-Agreement Protocols Random Oracle Model Barak and Mahmoody-Ghidary
2009/6/2
In this work we deal with one-round key-agreement protocols, called Merkle’s Puzzles,
in the random oracle model, where the players Alice and Bob are allowed to query a random
permutation oracle n t...
Identity Based Authenticated Key Agreement Protocols from Pairings
Identity Based Authenticated Key Agreement Protocols Pairings
2009/4/15
We investigate a number of issues related to identity based
authenticated key agreement protocols using the Weil or Tate pairings.
These issues include how to make protocols efficient; how to avoid ...
MULTI-PARTY AUTHENTICATED KEY AGREEMENT PROTOCOLS FROM MULTILINEAR FORMS
Multilinear forms Key Agreement protocol Authentication
2009/4/15
Joux [10] presented a one round protocol for tripartitie key agreement
and Al-Riyami et.al. [15] developed a number of tripartitie, one round, authenticated
protocols related to MTI and MQV protocol...
Tripartite Authenticated Key Agreement Protocols from Pairings
Secure protocols key agreement authentication
2009/4/13
Joux's protocol [29] is a one round, tripartite key agreement protocol that is more bandwidth-
efficient than any previous three-party key agreement protocol. But it is insecure, suffering from a sim...