搜索结果: 76-90 共查到“军事学 key agreement”相关记录150条 . 查询时间(0.102 秒)
Key Agreement from Close Secrets over Unsecured Channels
Key Agreement Close Secrets Unsecured Channels
2009/6/10
We consider information-theoretic key agreement between two parties sharing somewhat
different versions of a secret w that has relatively little entropy. Such key agreement, also known
as informatio...
Choo, Boyd & Hitchcock compared four well-known indistinguishability-based proof models for key agreement protocols
cryptography key agreement protocol proof model
2009/6/10
In 2005, Choo, Boyd & Hitchcock compared four well-known
indistinguishability-based proof models for key agreement protocols, which contains
the Bellare & Rogaway (1993, 1995) model, the Bellare , P...
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs
Strongly-Resilient Non-Interactive Hierarchical Key-Agreement MANETs
2009/6/5
Key agreement is a fundamental security functionality by which pairs of nodes agree on
shared keys to be used for protecting their pairwise communications. In this work we study
key-agreement scheme...
Survival in the Wild:Robust Group Key Agreement in Wide-Area Networks
Group Key Agreement Fault Tolerance Robustness
2009/6/5
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure
group communication. GKA is very useful in many types of peer group scenarios and applications...
Cryptanalysis of a client-to-client password-authenticated key agreement protocol
Cryptanalysis EC2C-PAKA impersonate attack
2009/6/5
Recently, Byun et al. proposed an efficient client-to-client password-authenticated key agreement protocol (EC2C-PAKA), which was provably secure in a formally defined security model. This letter show...
Breaking One-Round Key-Agreement Protocols in the Random Oracle Model
One-Round Key-Agreement Protocols Random Oracle Model Barak and Mahmoody-Ghidary
2009/6/2
In this work we deal with one-round key-agreement protocols, called Merkle’s Puzzles,
in the random oracle model, where the players Alice and Bob are allowed to query a random
permutation oracle n t...
Security Proof for the Improved Ryu{Yoon{Yoo Identity-Based Key Agreement Protocol
Key agreement protocols Reection attack Provable security
2009/6/2
Key agreement protocols are essential for secure communications in open
and distributed environments. The protocol design is, however, extremely error-prone
as evidenced by the iterative process of ...
Authentication and Key Agreement via Memorable Password
Authentication key agreement password guessing
2009/4/17
This paper presents a new password authentication and key agreement protocol, AMP,
based on the amplified password idea. The intrinsic problems with password authentica-
tion are the password itself...
Identity Based Authenticated Key Agreement Protocols from Pairings
Identity Based Authenticated Key Agreement Protocols Pairings
2009/4/15
We investigate a number of issues related to identity based
authenticated key agreement protocols using the Weil or Tate pairings.
These issues include how to make protocols efficient; how to avoid ...
MULTI-PARTY AUTHENTICATED KEY AGREEMENT PROTOCOLS FROM MULTILINEAR FORMS
Multilinear forms Key Agreement protocol Authentication
2009/4/15
Joux [10] presented a one round protocol for tripartitie key agreement
and Al-Riyami et.al. [15] developed a number of tripartitie, one round, authenticated
protocols related to MTI and MQV protocol...
ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings
Key agreement Bilinear pairings Identity-based cryptography
2009/4/15
With various applications of Weil pairing (Tate pairing) to
cryptography, ID-based encryption schemes, digital signature schemes,
blind signature scheme, two-party authenticated key agreement scheme...
Tripartite Authenticated Key Agreement Protocols from Pairings
Secure protocols key agreement authentication
2009/4/13
Joux's protocol [29] is a one round, tripartite key agreement protocol that is more bandwidth-
efficient than any previous three-party key agreement protocol. But it is insecure, suffering from a sim...
Secure and reliable group communication is an active area of research. Its popularity is caused by the
growing importance of group-oriented and collaborative applications. The central research challe...
An Improved ID-based Authenticated Group Key Agreement Scheme
Authenticated group key agreement Bilinear pairings Identity-based cryptography
2009/4/10
Authenticated group key agreement problem is important in many modern collaborative and distributed applications. There are two ID-based authenticated group key agreement schemes have been proposed by...
Attack on Two ID-based Authenticated Group Key Agreement Schemes
Authenticated group key agreement Bilinear pairings ID-based cryptography
2009/4/10
Authenticated group key agreement problem is important
in many modern collaborative and distributed applications. Recently,
there are two ID-based authenticated group key agreement schemes have
bee...