搜索结果: 121-135 共查到“军事学 key agreement”相关记录150条 . 查询时间(0.137 秒)
Dynamic Group Key Agreement in Tree-Based Setting
Dynamic Group Key Agreement Tree-Based Setting
2009/2/6
Dynamic Group Key Agreement in Tree-Based Setting.
On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases
Indistinguishability-Based Security Model Key Agreement Protocols-Simple Cases
2009/2/6
Since Bellare and Rogaway's work in 1994, the indistinguishability-based security models of authenticated key agreement protocols in simple cases have been evolving for more than ten years. In this pa...
Efficient Identity-Based and Authenticated Key Agreement Protocol
Efficient Identity-Based Authenticated Key Agreement Protocol
2009/1/23
Several identity based and authenticated key agreement protocols have been proposed in
recent years and all of them have been shown to be non-secure. It remains an open question
to design secure ide...
An efficient identity-based authenticated key agreement from pairing
authenticated key agreement identity-based cryptography Tate pairing
2009/1/22
We propose a two-party identity-based key agreement and key agreement with confirmation from pairing.It is inspired on a new Identity-Based Authenticated Key Agreement first proposed by Noel McCullagh...
On Efficient Key Agreement Protocols
Efficient Key Agreement Protocols Boyd concrete protocols
2009/1/19
A class of efficient key agreement protocols proposed by Boyd is examined. An attack is demonstrated on a round-optimal example protocol of this class, and a simple countermeasure is suggested. The wh...
Comments: Insider attack on Cheng et al.’s pairing-based tripartite key agreement protocols
attack tripartite key agreement protocols ID-based scheme
2009/1/13
Recently, Cheng et al. proposed two tripartite key agreement protocols from
pairings: one is certificate-based and the other is identity-based (ID-based). In this
article, we show that the two schem...
In this paper we show that the group key agreement protocol pro-
posed by Tseng suffers from a number of serious security vulnerabili-
ties.
Provably Secure Identity-Based Authenticated Key Agreement Protocols Without Random Oracles
identity-based cryptography authenticated key agreement bilinear pairings
2009/1/5
We present the first provably secure ID-based key agreement pro-
tocol, inspired by the ID-based encryption scheme of Gentry, in the standard
(non-random-oracle) model. We show how this key agreemen...
Chameleon-Based Deniable Authenticated Key Agreement Protocol
Chameleon Deniability Authentication Key Agreement
2008/12/18
As a useful means of safeguarding privacy of communications, deniable authentication has received much attention. A Chameleon-based deniable authenticated key agreement protocol is presented in this ...
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
key compromise impersonation key agreement protocols
2008/12/9
Key agreement protocols are a fundamental building block for ensuring
authenticated and private communications between two parties over an insecure
network. This paper focuses on key agreement prot...
Identity-based Key Agreement Protocols From Pairings
Identity-based Key Agreement Protocols Pairings
2008/11/27
In recent years, a large number of identity-based key agreement protocols from pairings
have been proposed. Some of them are elegant and practical. However, the security of this type
of protocols h...
Towards Provably Secure Group Key Agreement Building on Group Theory
group key establishment provable security conjugacy problem automorphisms of groups
2008/11/3
Known proposals for key establishment schemes based on
combinatorial group theory are often formulated in a rather informal
manner. Typically, issues like the choice of a session identifier and para...
Group Key Agreement for Ad Hoc Networks
μSTR μTGDH TFAN ad-hoc networks group key agreement
2008/10/17
Over the last 30 years the study of group key agreement has stimulated much work. And as a result of the
increased popularity of ad hoc networks, some approaches for the group key establishment in su...
Strongly-Secure Identity-based Key Agreement and Anonymous Extension
Key agreement identity-based cryptography reveal query provable security anonymity
2008/9/19
We study the provable security of identity-based (ID-based) key agreement protocols. Al-though several published protocols have been proven secure in the random oracle model, only a weak adversarial m...
Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol
Key agreement elliptic curve cryptography Diffie-Hellman protocol key-compromise impersonation
2008/9/18
In SAC'05, Strangio proposed protocol ECKE-1 as an efficient elliptic curve
Diffie-Hellman two-party key agreement protocol using public key authentication. In
this letter, we show that despite the ...