搜索结果: 91-105 共查到“军事学 key agreement”相关记录150条 . 查询时间(0.234 秒)
An ID-based Authenticated Two Round Multi-Party Key Agreement
multi-party key agreement Bilinear pairings Identity-based cryptography
2009/4/10
This paper proposes an ID-based authenticated two round multi-party key agreement among n parties. Several ID-based two-party and tripartite key agreement schemes were proposed recently. Rana Barua at...
This paper proposes a new identity based tripartite key agreement protocol which is more
efficient than the existing ID-based tripartite protocol. This protocol is based on the Joux's protocol for ke...
Cryptanalysis of Al-Riyami-Paterson’s Authenticated Three Party Key Agreement Protocols
Weil pairing Tate pairing tripartite authenticated key agreement protocol
2009/4/9
Recently, Al-Riyami and Paterson [1] proposed four authenticated
tripartite key agreement protocols which make use of Weil pairing.
In this paper, we show that the protocols are insecure against the...
Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols
Tripartite key agreement protocol man-in-the-middle attack implicit key authentication
2009/4/9
In this paper, we show that the Nalla-Reddy’s one round IDbased
tripartite authenticated key agreement protocols are still insecure
against the man-in-the-middle attacks. We also break the Nalla’s I...
Security Analysis of Shim’s Authenticated Key Agreement Protocols from Pairings
Cryptanalysis Weil Pairing ID-based
2009/4/9
Recently, Shim proposed a tripartite authenticated key agreement protocol
from Weil pairing to overcome the security flaw in Joux’s protocol.
Later, Shim also proposed an ID-based authenticated key ...
Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols
Passive attack Tripartite key agreement Bilinear pairings
2009/4/9
In this paper we propose security analysis on passive attack for
Nalla-Reddy's ID-AK-2 and ID-AK-3 protocols.
Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol
Provably-Secure Enhancement 3GPP Authentication Key Agreement Protocol
2009/4/9
Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol.
An Authenticated Group Key Agreement Protocol on Braid groups
braid groups conjugacy problem key agrement protocol
2009/4/8
In this paper, we extend the 2-party key exchange protocol on braid groups
to the group key agreement protocol based on the hardness of Ko-Lee problem. We also
provide authenticity to the group key ...
ID-based tripartite Authenticated Key Agreement Protocols from pairings
Key Agreement tripartite, elliptic curves Weil pairing
2009/4/7
This paper proposes ID-based tripartite authenticated key agreement protocols. The
authenticated three party key agreement protocols from pairings [15], and the ID-based two party authenticated key a...
Rethinking the security of some authenticated group key agreement schemes
Rethinking authenticated group key agreement schemes
2009/4/3
In this paper we analyse three improved authenticated group key agreement
schemes, all of which are based on the conference key distribution systems
proposed by Burmester and Desmedt. We show that a...
A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords
Three-party key agreement Password Verifier Active adversary
2009/4/3
Recently, Sun, Chen and Hwang [J. Syst. Software, 75 (2005), 63{68] have proposed
two new three-party protocols, one for password-based authenticated key agreement
and one for verifier-based authent...
Revisit of McCullagh–Barreto Two-Party ID-Based Authenticated Key Agreement Protocols
McCullagh–Barreto Two-Party ID-Based Authenticated Key Agreement Protocols
2009/4/3
The recently proposed two-party ID-based authenticated
key agreement protocols (with and without
escrow) and its variant resistant to key-compromise
impersonation by McCullagh & Barreto are revisit...
Cryptanalysis of Noel McCullagh and Paulo S. L. M. Barreto’s two-party identity-based key agreement
Cryptanalysis Weil Pairing ID-based
2009/4/1
Noel McCullagh and Paulo S. L. M. Barreto[1] proposed a two-party identity-based key agreement
protocol in 2004,which can be used in either escrowed or escrowless mode. They also described
condition...
Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices
Group key agreement key authentication forward secrecy
2009/3/27
In this paper, we show that Bresson-Chevassut-Essiari-Pointcheval's group key
agreement scheme does not meet the main security properties: implicit key authentication,
forward secrecy, and known key...
DDH-based Group Key Agreement in a Mobile Environment
group key agreement multicast security model DDH
2009/3/27
A group key agreement protocol is designed to efficiently implement secure mul-
ticast channels for a group of parties communicating over an untrusted, open network by
allowing them to agree on a co...