๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Improved authenticated multiple-key agreement protocol

โœ Scribed by Her-Tyan Yeh; Hung-Min Sun; Tzonelih Hwang


Publisher
Elsevier Science
Year
2003
Tongue
English
Weight
373 KB
Volume
46
Category
Article
ISSN
0898-1221

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Simple authenticated key agreement and p
โœ Ting-Yi Chang; Wei-Pang Yang; Min-Shiang Hwang ๐Ÿ“‚ Article ๐Ÿ“… 2005 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 800 KB

In this article, we shall present an authenticated key agreement protocol which is a modified and faster version of the Yeh-Sun scheme. Compared with the latest Kobara-Imai scheme, our scheme takes fewer steps and less computation cost. Besides, we shall also propose a protected password change prot

Secure authenticated group key agreement
โœ Chan Yeob Yeun; Kyusuk Han; Duc Liem Vo; Kwangjo Kim ๐Ÿ“‚ Article ๐Ÿ“… 2008 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 352 KB

Authenticated group key agreement a b s t r a c t Due to dynamic and infrastructure-less nature of Mobile Ad hoc Network (MANET) environment, there exist number of threats as mobile devices and nodes could freely move around in MANET such as eavesdropping of communications channels, modification of

Efficient identity-based authenticated m
โœ Zuowen Tan ๐Ÿ“‚ Article ๐Ÿ“… 2011 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 226 KB

Authenticated multiple key exchange protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In this paper, we propose an identity-based multiple key exchange protocol. The authentication part of the

Strongly secure identity-based authentic
โœ Liang Ni; Gongliang Chen; Jianhua Li; Yanyan Hao ๐Ÿ“‚ Article ๐Ÿ“… 2011 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 272 KB

In this paper, we present a strongly secure identity-based (ID-based) two-party authenticated key agreement (AKA) protocol, which captures all basic desirable security properties including master key forward secrecy, ephemeral secrets reveal resistance and so on, and is provably secure in the extend