𝔖 Bobbio Scriptorium
✦   LIBER   ✦

An internet key exchange protocol based on public key infrastructure

✍ Scribed by Jian-ming Zhu; Jian-feng Ma


Publisher
Chinese Electronic Periodical Services
Year
2004
Tongue
English
Weight
496 KB
Volume
8
Category
Article
ISSN
1007-6417

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


An identity-based key-exchange protocol
✍ Zhang Ya-juan; Zhu Yue-fei; Huang Qiu-sheng πŸ“‚ Article πŸ“… 2005 πŸ› Wuhan University 🌐 English βš– 367 KB
An improved key agreement protocol based
✍ Xingyuan Wang; Jianfeng Zhao πŸ“‚ Article πŸ“… 2010 πŸ› Elsevier Science 🌐 English βš– 209 KB

Cryptography based on chaos theory has developed fast in the past few years, but most of the researches focus on secret key cryptography. There are few public key encryption algorithms and cryptographic protocols based on chaos, which are also of great importance for network security. We introduce a

Enhancements of authenticated multiple k
✍ Duc-Liem Vo; Hyunrok Lee; Chan-Yeob Yeun; Kwangjo Kim πŸ“‚ Article πŸ“… 2010 πŸ› Elsevier Science 🌐 English βš– 160 KB

Lee et al. [4] proposed two new authenticated multiple key exchange protocols based on Elliptic Curve Cryptography (ECC) and bilinear pairings. In this paper, we show an impersonation attack on their pairing-based authenticated key exchange protocol. We demonstrate that any attacker can impersonate

An anonymous key agreement protocol base
✍ Yujun Niu; Xingyuan Wang πŸ“‚ Article πŸ“… 2011 πŸ› Elsevier Science 🌐 English βš– 192 KB

Recently, Tseng et al. proposed a novel key agreement protocol based on chaotic maps. They claimed that the protocol achieved session key agreement between a server and a user, and allowed the user to anonymously interact with the server. This paper, however, will demonstrate that Tseng et al.'s pro