Authenticated multiple key exchange protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In this paper, we propose an identity-based multiple key exchange protocol. The authentication part of the
An efficient identity-based protocol for private matching
โ Scribed by Sheng Zhong; Tingting Chen
- Publisher
- John Wiley and Sons
- Year
- 2010
- Tongue
- English
- Weight
- 135 KB
- Volume
- 24
- Category
- Article
- ISSN
- 1074-5351
- DOI
- 10.1002/dac.1169
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Wireless ad hoc networks consist of nodes with no central administration and rely on the participating nodes to share network responsibilities. Such networks are more vulnerable to security attacks than conventional wireless networks. We propose two efficient security schemes for these networks that
We propose an efficient quantum protocol for comparing the equal information with the help of a semihonest third party (TP). Our protocol utilizes the triplet W states and the single-particle measurement. A precise proof of security of the protocol is presented. The security of this protocol with re