Filters








54,665 Hits in 4.7 sec

A New Two-Party Identity-Based Authenticated Key Agreement [chapter]

Noel McCullagh, Paulo S. L. M. Barreto
2005 Lecture Notes in Computer Science  
We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes.  ...  It is inspired on a new identity-based key pair derivation algorithm first proposed by Sakai and Kasahara. We show how this key agreement can be used in either escrowed or escrowless mode.  ...  Introduction In this paper we propose a new two-party authenticated identity-based key agreement from bilinear maps.  ... 
doi:10.1007/978-3-540-30574-3_18 fatcat:irkjkdghqfgibcyvu5lg6diuyq

A new two-round certificateless authenticated key agreement protocol without bilinear pairings

Debiao He, Yitao Chen, Jianhua Chen, Rui Zhang, Weiwei Han
2011 Mathematical and computer modelling  
In this paper, we propose a new certificateless authenticated key agreement protocol without pairing. The user in our just needs to compute five scale multiplication to finish the key agreement.  ...  Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography.  ...  As an important part of CLPKC, certificateless two-party authenticated key agreement (CTAKA) protocols have also received considerable attention.  ... 
doi:10.1016/j.mcm.2011.08.004 fatcat:2nxbonggorg4pf72auvjdjdog4

Authenticated Diffie-Hellman Key Agreement Scheme that Protects Client Anonymity and Achieves Half-Forward Secrecy

Hung-Yu Chien
2015 Mobile Information Systems  
As client's privacy is a big concern in several e-commerce applications, it is desirable to extend authenticated D-H key agreement to protect client's identity privacy.  ...  Based on the MECDHP, we propose an authenticated D-H key agreement scheme which greatly improves client computational efficiency and protects client's anonymity from outsiders.  ...  Then we propose a new authenticated two-party key agreement scheme with client anonymity, based on the MECDHP problem and Ohkubo et al. 's hashing chain technique [1] .  ... 
doi:10.1155/2015/354586 fatcat:srick5gasfhihe4a6cwcazl23i

A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography

Fengjiao Wang, Yuqing Zhang
2007 2007 International Conference on Computational Intelligence and Security (CIS 2007)  
This paper proposes a new secure authentication and key agreement mechanism based on certificateless public-key cryptography, named as SAKA, between two previously unknown parties, which provides stronger  ...  Different from the above mentioned work, recently, a new authentication mechanism and key agreement protocol for SIP using Identity-based cryptography has been given in [9], which provides mutual authentication  ...  Th a new authentication and key agreement mechanism using CLs mutual authentication, and a shared secret between previously unknown parties is established.  ... 
doi:10.1109/cis.2007.113 dblp:conf/cis/WangZ07 fatcat:b657s7hskfafnj6hc63ttqdjii

ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms [chapter]

Hyung Mok Lee, Kyung Ju Ha, Kyo Min Ku
2005 Lecture Notes in Computer Science  
In this paper, we propose new ID-based multi-party authenticated key agreement protocols, which use the identity information of a user as his long-term public/private key, from multilinear forms.  ...  Nalla and Reddy [6] presented new ID-based tripartite authenticated key agreement protocols from parings.  ...  Now, we propose new ID-based multi-party authenticated key agreement protocols from multilinear forms.  ... 
doi:10.1007/11556992_8 fatcat:bptx5cxqb5csndyvtry63nqwjq

IDENTITY BASED AUTHENTICATED KEY AGREEMENT FROM PAIRINGS

HYANG-SOOK LEE, YOUNG-RAN LEE
2005 Communications of the Korean Mathematical Society  
We present a new identity based authenticated key agreement protocol from pairings satisfying the required security attributes.  ...  The security of our protocol is based on the bilinear Diffie-Hellman assumption.  ...  In section 3, we review some known authenticated key agreement protocols and provide an efficient new identity-based authenticated key agreement scheme.  ... 
doi:10.4134/ckms.2005.20.4.849 fatcat:ujpmtjg7qbgerdxiaynoga7il4

An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings [chapter]

Jai-Boo Oh, Eun-Jun Yoon, Kee-Young Yoo
2007 Lecture Notes in Computer Science  
In this paper, we describe a new ID-based authenticated key agreement protocol that makes use of bilinear pairings.  ...  An important advantage of our scheme is that it preserves the perfect forward secrecy even though the long-term secret key of a trusted key generation center is compromised.  ...  In this section we demonstrate a new ID-based authenticated key agreement protocol. This protocol consists of two phases: system setup and authenticated key agreement.  ... 
doi:10.1007/978-3-540-74742-0_41 fatcat:3x33bf4rarhnfawyxbd6jxpt3e

An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings [chapter]

Eun-Kyung Ryu, Eun-Jun Yoon, Kee-Young Yoo
2004 Lecture Notes in Computer Science  
In this paper, we describe a new ID-based authenticated key agreement protocol that makes use of bilinear pairings.  ...  An important advantage of our scheme is that it preserves the perfect forward secrecy even though the long-term secret key of a trusted key generation center is compromised.  ...  The Protocol In this section we demonstrate a new ID-based authenticated key agreement protocol. This protocol consists of two phases: system setup and authenticated key agreement.  ... 
doi:10.1007/978-3-540-24693-0_135 fatcat:gbzsirzrjjfxhcyigfi3tbplqu

A new provably secure authentication and key agreement protocol for SIP using ECC

Liufei Wu, Yuqing Zhang, Fengjiao Wang
2009 Computer Standards & Interfaces  
This paper proposes a new authenticated key exchange protocol NAKE, which can solve the existed problems in the original proposal.  ...  The authentication mechanism proposed in SIP specification is HTTP digest based authentication, which allows malicious parties to impersonate other parties or to charge calls to other parties, furthermore  ...  An identity-based authentication and key agreement protocol without formal analysis was presented in [6] , and the off-line password guessing attack and server spoofing attack to original authentication  ... 
doi:10.1016/j.csi.2008.01.002 fatcat:cfnt2gvebzdvbgzmaxtqa6nfne

A Note on Group Authentication Schemes

Mohsen Pourpouneh, Rasoul Ramezanian, Afshin Zarei
2016 International Journal of Computer Network and Information Security  
The agents participating in a group need to authenticate each other in order to become assure that every agents that has access to the group key is an eligible member.  ...  In this paper, we informally classify different group authentication schemes, based on how the agents authenticate each other and provide examples of each class.  ...  The generalization of what authentication is in a group key agreement protocol is different from two party protocols.  ... 
doi:10.5815/ijcnis.2016.05.03 fatcat:xdzqczpmovcajml2pizs6betli

Secure Proxy Signature Based On Factoring And Discrete Logarithm

H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi
2016 Zenodo  
Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.  ...  In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.  ...  NEW KEY AGREEMENT PROTOCOL The used protocol for the authenticated key agreement [17] provides authentication between the two parties A and B before exchanging the session keys.  ... 
doi:10.5281/zenodo.1339382 fatcat:vwncsjhbjzhnzpujffu34mydie

An Improved Certificateless Authentication Key Agreement Protocol

Renu Srivastava, A.K. Misra
2013 International Journal of Computer Applications  
To overcome the key escrow issues of the identity based cryptography, Shi Yijuan and Ll Jianhua [11] proposed a new Certificateless Two-party Authentication Key Agreement (CL-2AKA) protocol.  ...  The proposed protocol CAKA (Certificateless Authentication Key Agreement Protocol) is based on the algebraic properties of the pairing.  ...  Shi Yijuan, LI Jianhua [11] proposed a new Certificateless Two-party Authentication Key Agreement (CL-2AKA) protocol in 2007.  ... 
doi:10.5120/11942-7736 fatcat:ftcsoudefrd2lhc2mjmemgnxwm

Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography

Sonali Nimbhorkar, Latesh Malik
2016 Procedia Computer Science  
Authenticated key agreement protocol must put in a nutshell of competent and strong cryptographic algorithm which is ensure confidentiality and integrity of message.  ...  To study network security tools in order to establish key agreement between two party or multi party communications various techniques and algorithms for implementation elliptic curve cryptosystem are  ...  Design Methodology Authenticated key Agreement Protocols Technical categories of Authentication with key agreement approaches are Password based key, Public key infrastructure based, Identity-based key  ... 
doi:10.1016/j.procs.2016.02.065 fatcat:xijbg6e7jffwnjuwdqrmpptpqa

Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures [chapter]

Michael Braun, Ulrike Meyer, Susanne Wetzel
2010 Lecture Notes in Computer Science  
In this paper, we propose a new public-key-based mutual authentication protocol that addresses the reader revocation problem while maintaining efficiency and identity privacy.  ...  In addition, our new protocol integrates fine-grained access control and key establishment with mutual authentication.  ...  Key Agreement, Identity Privacy, and Tag-to-Reader Authentication: In order to achieve tag-to-reader authentication, allow for identity privacy, and establish a symmetric (short-lived) session key, our  ... 
doi:10.1007/978-3-642-12368-9_9 fatcat:ew2kqfqugja5lomh43wnozpdzi

An Efficient Proxy Signature Scheme Over A Secure Communications Network

H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi
2016 Zenodo  
Authenticated key agreement protocols have an important role in building secure communications network between the two parties.  ...  In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem.  ...  NEW KEY AGREEMENT PROTOCOL The used protocol for authenticated key agreement [10] provides authentication between the two parties A and B before exchanging the session keys.  ... 
doi:10.5281/zenodo.1339372 fatcat:uiljzwm57ffb5dyu2qzexchl4a
« Previous Showing results 1 — 15 out of 54,665 results