搜索结果: 106-120 共查到“军事学 key agreement”相关记录150条 . 查询时间(0.148 秒)
A New Two-Party Identity-Based Authenticated Key Agreement
authenticated key agreement identity-based cryptography bilinear maps
2009/3/27
We present a new two-party identity-based key agreement
that is more efficient than previously proposed schemes. It is inspired
on a new identity-based key pair derivation algorithm first proposed b...
Provably Secure Authenticated Tree Based Group Key Agreement Protocol
Secure Authenticated Tree Group Key Agreement Protocol
2009/3/25
Provably Secure Authenticated Tree Based Group Key Agreement Protocol.
Pairing-Based One-Round Tripartite Key Agreement Protocols
Pairing-Based One-Round Tripartite Key Agreement Protocols
2009/3/25
Since Joux published the first pairing-based one-round tripartite key agreement pro-
tocol [13], many authenticated protocols have been proposed. However most of them were soon
broken or demonstrate...
Weakness of Shim’s New ID-based Tripartite Multiple-key Agreement Protocol
ID-based Weil-paring impersonation attack
2009/3/19
In this article we show that Shim’s new ID-based tripartite multiple-key agreement protocol still suffers from the impersonation attack, a malicious user can launch an impersonation attack on their pr...
Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings
ID-based system bilinear pairing authenticated key agreement protocol
2009/3/10
Recently, a number of ID-based two-party authenticated key
agreement protocols which make of bilinear pairings have been proposed
[3, 8, 12, 11, 14]. In this paper, we show that the Xie’s protocol [...
Pairing-Based Two-Party Authenticated Key Agreement Protocol
Pairing-Based Two-Party Authenticated Key Agreement Protocol
2009/3/9
authenticated by each other and agree on a secret session key by
exchanging messages over an insecure channel. In this paper, based on the
bilinear pairing, we present a new two-party authenticated ...
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings
Identity-Based Key Agreemen Unilateral Identity Privacy Using Pairings
2009/3/6
In most of the existing identity-based key agreement schemes,
it is usually assumed that either the communicated parties know each
other's identifier before the protocol starts or their identifiers ...
A New Efficient ID-Based Authenticated Key Agreement Protocol
ID-Based Key Agreement Key Compromise Impersonation
2009/3/3
Recently Eun-Kyung Ryu, Eun-Jun Yoon, and Kee-Young Yoo pro-
posed an efficient ID-based authenticated key agreement with paring[11].
They argued that it is secure and efficient. In this paper, we s...
Towards Security Two-part Authenticated Key Agreement Protocols
key management authenticated protocol ID-based Key Compromise Impersonation
2009/3/2
We first present a new security 2-AK protocol, which is more secure and more efficient than previously proposed ones. Meanwhile, we point that Xie’s ID-2-AK protocol modified from McCullagh-Barreto i...
Overview of Key Agreement Protocols
Key Agreement Protocols AK Authenticated Die-Hellman key agreement
2009/2/26
The emphasis of this paper is to focus on key agreement. To this aim, we address a selfcontained,up-to-date presentation of key agreement protocols at high level. We have attempted to provide a brief ...
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards
Diffie-Hellman Problem Discrete Logarithm Problem fast generators, trapdoor.
2009/2/18
The Diffie-Hellman key agreement protocol is based
on taking large powers of a generator of a prime-order cyclic group.
Some generators allow faster exponentiation. We show that to
a large extent, ...
Constant Round Dynamic Group Key Agreement
group key agreement DDH problem provable security
2009/2/17
We present a fully symmetric constant round authenticated group key agreement protocol in dynamic scenario. Our proposed scheme achieves forward secrecy and is provably secure under DDH assumption in ...
On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants
Security Proof McCullagh-Barreto's Key Agreement Protocol Variants
2009/2/16
McCullagh and Barreto presented an identity-based authenticated key
agreement protocol in CT-RSA 2005. Their protocol was found to be vulnerable to a
key-compromise impersonation attack. In order t...
Security properties of two authenticated conference key agreement protocols
Security properties authenticated conference key agreement protocol insider attacks
2009/2/12
In this paper we analyse the security of two authenticated group key agreement
schemes based on the group key agreement protocol of Burmester
and Desmedt. One scheme was proposed by Burmester and De...
On the security of some password-based key agreement schemes
password-based key agreement schemes authenticated key exchange scheme BPKAS-SPEKE
2009/2/8
In this paper we show that two potential security vulnerabilities exist in
the strong password-only authenticated key exchange scheme due to Jablon.
Two standardised schemes based on Jablon’s scheme...