搜索结果: 61-75 共查到“军事学 key agreement”相关记录150条 . 查询时间(0.257 秒)
Key Agreement Protocols Using Multivariate Equations on Non-commutative Ring
key agreement protocol multivariate equations Grö bner bases NP complete problems non-commutative ring
2010/9/1
In this paper we propose two KAP(key agreement protocols) using multivariate equations. As the enciphering functions we select the multivariate functions of high degree on non-commutative ring H over ...
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Information Reconciliation Privacy Amplification Fuzzy Extractors Randomness Extractors Error-Correcting Codes Biometric Authentication
2010/8/26
Consider two parties holding samples from correlated distributions W and W', respectively, that are within distance t of each other in some metric space. These parties wish to agree on a uniformly dis...
Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring
key agreement protocol multivariable algebraic equation Grö bner bases NP complete problems quaternion
2010/7/14
In this paper we propose new key agreement protocols based on multivariate algebraic equations. We choose the multivariate function F(X) of high degree on non-commutative quaternion ring H over finite...
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
cryptographic protocols AKA (Authenticated Key Agreement) Key Exchange
2010/7/14
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely considered for new ap...
Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card
Authentication Security Cryptanalysis card Attacks
2010/7/13
The weakness of an exquisite authentication scheme based on smart cards and passwords proposed by Liao et al. [C. H. Liao, H. C. Chen, and C. T. Wang, An Exquisite Mutual Authentication Scheme with Ke...
On Robust Key Agreement Based on Public Key Authentication
Robust Key Agreement Public Key Authentication
2010/3/16
This paper discusses public-key authenticated key
agreement protocols. First, we critically analyze several authenticated
key agreement protocols and uncover various theoretical
and practical flaws...
An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem
ID-based Mutual authentication Key agreement
2010/2/1
Recently, Yoon et al. and Wu proposed two improved remote mutual authentication
and key agreement scheme for mobile devices on elliptic curve cryptosystem. In this paper, we
show that Yoon et al.’s ...
Security Analysis of the PACE Key-Agreement Protocol
Security Analysis PACE Key-Agreement Protocol
2009/12/29
We analyze the Password Authenticated Connection Establishment (PACE)
protocol for authenticated key agreement, recently proposed by the German Federal
Office for Information Security (BSI) for the ...
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Certificateless Encryption ID-Based Encryption ID-Based Key Agreement
2009/12/29
We discuss the relationship between ID-based key agree-
ment protocols, certificateless encryption and ID-based key encapsula-
tion mechanisms. In particular we show how in some sense ID-based key
...
An enhanced password authenticated key agreement protocol for wireless mobile network
Password Authentication Key Agreement
2009/12/29
Password-based Authenticated Key Agreement (PAKA) protocols are widely used in wireless mobile networks, however many existing PAKA protocols have security flaws. In the 3GPP2 network, there are sever...
Practical remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
ID-based mutual authentication key agreement
2009/11/18
Most recently, Yang et al proposed an ID-based remote mutual authentication with
key agreement scheme for mobile devices on elliptic curve cryptosystem in journal of
Computer and Security. In this p...
Cryptanalysis of Multiple-Server Password-Authenticated Key Agreement Schemes Using Smart Cards
Multiserver Password-authentication Insider Impersonation Attack DoS Attack
2009/11/18
Password-based user-authentication schemes have been widely used when users access a
server to avail internet services. Multiserver password-authentication schemes enable remote
users to obtain serv...
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings
Authenticated Diffie-Hellman SOK protocol ID-based key agreement
2009/9/11
This paper studies the relationships between the traditional Diffie-Hellman key
agreement protocol and the identity-based (ID-based) key agreement protocol from pairings.
For the Sakai-Ohgishi-Kasah...
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols
Postponed ephemeral keys pseudo-static keys tripartite key agreement
2009/9/2
We propose an new one-round implicitly authenticated three-party protocol that ex-
tends Joux's protocol as well as a two-party identity-based protocol. Our protocols have a single
communication rou...
Strongly Secure Certificateless Key Agreement
Strongly Secure Certificateless Key Agreement first one-round CL-AKE scheme CL-AKE
2009/6/12
We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols.
Contrary to what might be expected, we show that the natural combination of an ID-based AKE
protocol wi...