Filters








2,470 Hits in 4.3 sec

A Quantum Diffie-Hellman Protocol

Pranav Subramaniam, Abhishek Parakh
2014 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems  
In this paper, a quantum version of Diffie-Hellman key agreement protocol is developed using the commutative rotation transformations.  ...  THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL Diffie and Hellman in their seminal work [7] developed a key agreement scheme between parties Alice and Bob over an insecure channel.  ...  THE PROPOSED QUANTUM DIFFIE-HELLMAN PROTOCOL The QDH(t) is a key agreement protocol wherein Alice and Bob derive a shared secret key based on the information obtained from each other.  ... 
doi:10.1109/mass.2014.89 dblp:conf/mass/SubramaniamP14 fatcat:o6pxnmilpvandhrhuo4qu2efxm

The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks

Yong Wang, Byrav Ramamurthy, Xukai Zou
2006 2006 IEEE International Conference on Communications  
The security of the two party Diffie-Hellman key exchange protocol is currently based on the discrete logarithm problem (DLP).  ...  This paper proposes the ECDLP-based Diffie-Hellman protocols for secure group communication and evaluates their performance on wireless ad hoc networks.  ...  Two Party Elliptic Curve Diffie-Hellman Protocol Similar to DLP-based Diffie-Hellman key exchange agreement, a key exchange between users A and B using Elliptic Curve Diffie-Hellman (ECDH) can be accomplished  ... 
doi:10.1109/icc.2006.255104 dblp:conf/icc/WangRZ06 fatcat:zrryl4ndrbd5xnarqd2txdvmgm

DHB-KEY: An efficient key distribution scheme for wireless sensor networks

Tony Chung, Utz Roedig
2008 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems  
This paper presents a key distribution scheme based on the well known Elliptic Curve Diffie-Hellman key exchange mechanism that allows us to fulfil the previously outlined requirements efficiently.  ...  In the paper we present a protocol specification based on the DHB-KEY scheme and its implementation for the well known TinyOS platform.  ...  DIFFIE-HELLMAN BROADCAST KEY EXCHANGE This section describes the Diffie-Hellman 3 Broadcast (DHB) Key exchange mechanism.  ... 
doi:10.1109/mahss.2008.4660127 dblp:conf/mass/ChungR08 fatcat:z3jtjjzrszf6tarw7jajgo6lum

A secure and efficient conference key distribution system [chapter]

Mike Burmester, Yvo Desmedt
1995 Lecture Notes in Computer Science  
We present practical conference key distribution systems based on public keys, which authenticate the users and which are 'proven' secure provided the Diffie-Hellman problem is intractable.  ...  Depending on the network used, we either have a constant (in the number of conference participants) number of rounds (exchanges) or a constant communication and computation overhead.  ...  Acknowledgements The authors wish to thank Ren~ Peralta, Adi Shamir, Oded Goldreich, and Moti Yung, for helpful discussions and suggestions, in particular in Section 3.1.  ... 
doi:10.1007/bfb0053443 fatcat:p545ahosdbcq3amibhuozjtcia

Efficient group Diffie–Hellman key agreement protocols

Lein Harn, Changlu Lin
2014 Computers & electrical engineering  
In this paper, we propose GDH key agreement protocols based on the secret sharing scheme.  ...  Most GDH key agreement protocols took natural generalization of the original Diffie-Hellman (DH) key agreement protocol to arrange all group members in a logic ring or a binary tree and to exchange DH  ...  Acknowledgments The authors would like to thank the reviewers for their suggestions to improve the quality of this paper.  ... 
doi:10.1016/j.compeleceng.2013.12.018 fatcat:vl3r5izgo5abbesyx5rtwk25qu

Secure key establishment for Device-to-Device communications

Wenlong Shen, Weisheng Hong, Xianghui Cao, Bo Yin, Devu Manikantan Shila, Yu Cheng
2014 2014 IEEE Global Communications Conference  
Our approach is based on the Diffie-Hellman key agreement protocol and commitment schemes. Compared to previous work, our proposed protocol introduces less communication and computation overhead.  ...  In this paper, we investigate the security requirements and challenges for D2D communications, and present a secure and efficient key agreement protocol, which enables two mobile devices to establish a  ...  ACKNOWLEDGMENT This work was supported in part by the NSF under grants CNS-1320736 and CNS-1117687.  ... 
doi:10.1109/glocom.2014.7036830 dblp:conf/globecom/ShenHCYSC14 fatcat:muyf6ezlqbfypnff5xde632zxq

An enhanced ID-Based anonymous proxy signature scheme on pairings

Chengyu Hu, Pengtao Liu
2010 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE)  
In the paper we present the design of new digital signature protocol with the secretly hidden warning in the Gap Diffie-Hellman group.  ...  The proposed scheme is the extended Id based protocol applying the idea of Schnorr signature and the subliminal channel defined by Simmons. Streszczenie.  ...  One basing on the idea of sharing the secret key between X and the trustee T, k XT and applying the notion of deniable encryption and the other based on the Diffie-Hellman key exchange idea.  ... 
doi:10.1109/iccae.2010.5451676 fatcat:vgjdjti7lveyrnmvwpzydho33u

A Study on Contributory Group Key Agreements for Mobile Ad Hoc Networks

CH. V. Raghavendran, G. Naga Satish, P. Suresh Varma
2013 International Journal of Computer Network and Information Security  
The basic needs of such networks require that the group key schemes must demonstrate not only high performance but also fault-tolerance.  ...  Security for MANETs is a dynamic area of research. Most of the traditional routing protocols proposed for MANETs are focused on routing only not on the security aspects.  ...  Group Diffie-Hellman Key Exchange (GDH): GDH is a group key distribution scheme proposed by Steiner, Tsudik, and Waidner [23] in three versions.  ... 
doi:10.5815/ijcnis.2013.04.07 fatcat:hj4x25eqcrdbpc6z6jtjxtph4m

Delay and cost performance analysis of the diffie-hellman key exchange protocol in opportunistic mobile networks

B Soelistijanto, V Muliadi
2018 Journal of Physics, Conference Series  
Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network.  ...  Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer  ...  The Diffie-Hellman Key Exchange Protocol The Diffie-Hellman (DH) protocol offers an efficient method for exchanging keys in the network.  ... 
doi:10.1088/1742-6596/978/1/012016 fatcat:q42pp6adt5djhpiqg7drzhggq4

Establishment of conference keys in heterogeneous networks

W. Trappe, Y. Wang, K.J. Ray Liu
2002 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333)  
In this paper, we present a scheme for establishing a conference key using the two-party Diffie-Hellman scheme.  ...  Index Terms-Conference key, Diffie-Hellman, Huffman Coding Wade Trappe is with the  ...  The classic example of a two-party key agreement protocol is the Diffie-Hellman key exchange scheme [4] .  ... 
doi:10.1109/icc.2002.997237 dblp:conf/icc/TrappeWL02 fatcat:wtxgwxvsijd4je7z4tzebmud6m

A New Cryptographic Scheme for Securing Dynamic Conferences in Data Networks

Sarang Deshpande, Ajay Todimala, Ravi Balachandran, Byrav Ramamurthy, Xukai Zou, N. Vinodchandran
2006 2006 IEEE International Conference on Communications  
We propose a relatively scalable KD scheme termed as DH-SPDCS that uses the UI-SPDCS scheme and the tree-based group Diffie-Hellman (TGDH) key exchange protocol.  ...  The extended symmetric polynomial based dynamic conferencing scheme (ESPDCS) is one such KD scheme which has a high computational complexity that is universe size dependent.  ...  In the next section we present a KD scheme that uses both the UI-SPDCS scheme and the Tree-based Group Diffie-Hellman (TGDH) key exchange protocol to further scale the size of the conference. IV.  ... 
doi:10.1109/icc.2006.255114 dblp:conf/icc/DeshpandeTBRZV06 fatcat:m76jsd3v2fcqngkqzaarfch4x4

Provably authenticated group Diffie-Hellman key exchange

Emmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater
2001 Proceedings of the 8th ACM conference on Computer and Communications Security - CCS '01  
Group Diffie-Hellman protocols for Authenticated Key Exchange (AKE) are designed to provide a pool of players with a shared secret key which may later be used, for example, to achieve multicast message  ...  We then define in this model the execution of an authenticated group Diffie-Hellman scheme and prove its security. The second author was supported by the Director, Office  ...  Acknowledgements The authors thank Deborah Agarwal for many insightful comments on an early draft of this paper and the anonymous referees for their many useful comments.  ... 
doi:10.1145/502014.502018 fatcat:nxjrht6a2bbixlmacproi5d4gy

Provably authenticated group Diffie-Hellman key exchange

Emmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater
2001 Proceedings of the 8th ACM conference on Computer and Communications Security - CCS '01  
Group Diffie-Hellman protocols for Authenticated Key Exchange (AKE) are designed to provide a pool of players with a shared secret key which may later be used, for example, to achieve multicast message  ...  We then define in this model the execution of an authenticated group Diffie-Hellman scheme and prove its security. The second author was supported by the Director, Office  ...  Acknowledgements The authors thank Deborah Agarwal for many insightful comments on an early draft of this paper and the anonymous referees for their many useful comments.  ... 
doi:10.1145/501983.502018 dblp:conf/ccs/BressonCPQ01 fatcat:b6sa6dnomnbibkjrkwpny6wkxq

Resource-aware conference key establishment for heterogeneous networks

W. Trappe, Yuke Wang, K.J. Ray Liu
2005 IEEE/ACM Transactions on Networking  
The Diffie-Hellman problem is often the basis for establishing conference keys.  ...  Index Terms-Conference key agreement, Diffie-Hellman, Huffman algorithm.  ...  One of the first Diffie-Hellman-like conference key establishment schemes was proposed by Ingemarsson et al. [10] .  ... 
doi:10.1109/tnet.2004.842236 fatcat:xhps24hrkfgcfi4fnmpn7dik2i

Establishing authenticated pairwise key using Pairing-based Cryptography for sensor networks

Lijun Yang, Chao Ding, Meng Wu
2013 2013 8th International Conference on Communications and Networking in China (CHINACOM)  
Our proposal, which works based on the elliptic curve Diffie-Hellman (ECDH) exchange and identity-based cryptography, can effectively resist man-in-the-middle attacks and node-capture attacks through encrypting  ...  In this paper, we propose a novel authenticated key agreement scheme using Pairing-based Cryptography, named IBAKA, to address the problems of high memory occupation, low key connectivity and poor resiliency  ...  [8] propose an approach based on identity-based encryption and Diffie-Hellman Algorithms, providing authenticated key agreement between pairs of sensor nodes.  ... 
doi:10.1109/chinacom.2013.6694650 fatcat:mhib2wth65ekjboh6lb3m5imva
« Previous Showing results 1 — 15 out of 2,470 results