Filters








400 Hits in 6.9 sec

Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications

Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Zheming Dong
2015 IEEE Transactions on Information Forensics and Security  
This paper studies the problem of group key agreement in identity-based cryptosystems with an emphasis on round-efficient, sender-unrestricted, member-dynamic and provably secure key escrow freeness.  ...  has a different secret decryption key in an identity-based cryptosystem.  ...  Our Contributions In [24] , a static identity-based authenticated asymmetric group key agreement (IBAAGKA) protocol without key escrow was proposed, which enables a group of users to establish a common  ... 
doi:10.1109/tifs.2015.2447933 fatcat:xmf4slar7ba4zij4all3ldixh4

A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks

Shushan Zhao, Akshai Aggarwal, Richard Frost, Xiaole Bai
2012 IEEE Communications Surveys and Tutorials  
This is a survey on application of Identity-Based Cryptography in mobile ad hoc networks.  ...  To introduce the topic, we first review most important developments on general Identity-Based Cryptography.  ...  Chien et al [Chien and Lin 2006] propose an Identity-Based key agreement protocol for MANETs using IBC.  ... 
doi:10.1109/surv.2011.020211.00045 fatcat:bcgqnhfzxrdvlfoq6tmucsjdea

SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS

Adarsh Kumar, Alok Aggarwal, Charu
2012 Zenodo  
The purpose of this paper is to survey the key management protocols for wired and wireless networks and study their security aspects in terms of key generation, agreement and distribution.  ...  In this survey, it is shown that all these protocols could be placed under one of two key management protocol categories: (i) peer to peer communication and (ii) group communication.  ...  (iii) Peer to Peer Communication Based Key Management Protocols Symmetric Key agreement & distribution protocols If a party Alice wants to share a key with another party Bob then this can be achieved  ... 
doi:10.5281/zenodo.3358527 fatcat:2f46sy6bwfaj3gxf4aokqrj7o4

A Survey on Single Sign-On Mechanisms for Distributed Computer Networks
English

N Gomathy, Dr.N Radha
2014 International Journal of Computer Trends and Technology  
In the distributed computer networks, user verification is an important process for the security.  ...  After completion of the user and service provider verification, a session key is provided to maintain the confidentiality of the data exchange between a user and a service provider.  ...  For the group signatures, the interactive counterparts of are individuality escrow schemes or group recognition scheme with revocable obscurity.  ... 
doi:10.14445/22312803/ijctt-v13p125 fatcat:ogiibyxpqzdtlcf7m7fnpntcgi

A Novel Identity-Based Mutual Authentication Scheme for Vehicle Ad Hoc Networks

Chaofan Di, Wanqing Wu, Daniel G. Reina
2022 Wireless Communications and Mobile Computing  
To solve this problem, we propose a novel identity-based mutual authentication scheme (IBMA) for vehicle ad hoc networks.  ...  In this scheme, we adopt identity-based cryptography (IBC) to generate keys, which reduces the storage burden of the central authority and eliminates the need to rely on the certificate to distribute the  ...  [25] proposed a password-based conditional privacy protection authentication protocol and group key agreement protocol.  ... 
doi:10.1155/2022/7881079 fatcat:katinizcqfduhkyplv7dwh6vda

Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks

Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa
2007 International Journal of Network Security  
In this paper, we propose two different n-party authenticated key agreement protocols enabling authorized nodes to generate their own session keys.  ...  The first protocol introduces a solution based on clustering techniques suitable for networks with partial structure and composed of a large number of nodes.  ...  Session Group Key Generation In this section, an authenticated group key agreement protocol will be presented which uses identity-based pairwise keys for entity authentication.  ... 
dblp:journals/ijnsec/Abdel-HafezMO07 fatcat:4sidhrjajjav7fc77mubkju6u4

How to Bootstrap Security for Ad-Hoc Network: Revisited [chapter]

Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
2009 IFIP Advances in Information and Communication Technology  
Further, it supports ownership enforcement and key-escrow.  ...  Although we can get enormous conveniences by connecting them together, it is difficult to securely associate them in an ad-hoc manner.  ...  Broadcast in a Channel Although novel approaches of pairing-based group key agreement protocols have been proposed [7, 11, 10] , they do not provide sufficient security under certain conditions and impose  ... 
doi:10.1007/978-3-642-01244-0_11 fatcat:gjor4trfkbbl3obq2dgntfvwi4

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses

Ivan Homoliak, Sarad Venugopalan, Daniel Reijsbergen, Qingze Hum, Richard Schumi, Pawel Szalachowski
2020 IEEE Communications Surveys and Tutorials  
Blockchains are distributed systems, in which security is a critical factor for their success.  ...  to systematize and extend the knowledge about the security and privacy aspects of blockchains and contribute to the standardization of this domain.We propose the security reference architecture (SRA) for  ...  ACKNOWLEDGMENT The authors would like to thank our colleagues Pieter Hartel, Stefanos Leonardos, and Mark van Staalduinen for their valuable feedback.  ... 
doi:10.1109/comst.2020.3033665 fatcat:hcrsvvkb2ffmbdlspshy66wg2y

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses [article]

Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Daniel Reijsbergen, Richard Schumi, Pawel Szalachowski
2020 arXiv   pre-print
Blockchains are distributed systems, in which security is a critical factor for their success.  ...  We propose the security reference architecture (SRA) for blockchains, which adopts a stacked model (similar to the ISO/OSI) describing the nature and hierarchy of various security and privacy aspects.  ...  According to the decentralization of the mediator, escrow protocols can be split into single mediator protocols and protocols with a group-based mediator. Goldfeder et al.  ... 
arXiv:1910.09775v2 fatcat:xvxnekjhtbbt7dc4b3kxy3m6xi

A survey of Key bootstrapping protocols based on Public Key Cryptography in the Internet of Things

Manisha Malik, Maitreyee Dutta, Jorge Granjal
2019 IEEE Access  
In this paper, we survey the state of the art in key bootstrapping protocols based on public-key cryptography in the Internet of Things.  ...  Due to its inherent scalability, such protocols are particularly relevant for the implementation of distributed identity and trust management mechanisms on the IoT, in the context of which devices may  ...  Managed methods typically use centralized servers for authentication, whereas peer-topeer methods usually use an out-of-band (OOB) communication channel, in order to ensure dynamic authentication of the  ... 
doi:10.1109/access.2019.2900957 fatcat:fbpg4ydg55bg5okyljo67hycqq

Trust threshold based public key management in mobile ad hoc networks

Jin-Hee Cho, Ing-Ray Chen, Kevin S. Chan
2016 Ad hoc networks  
We demonstrate that CTPKM outperforms both existing non-trust-based and trust-based counterparts. tation and communication overhead as well as network dynamics that could require frequent key reassignments  ...  Chauhan and Tapaswe [16] proposed a key management approach for MANETs with no trusted third entity. This work employs a group leader as a CA to manage key generation and distribution.  ...  For completeness, we also survey identity-based (Section 2.3), threshold-based (Section 2.2), certificate-less cryptography (Section 2.4), and combined (Section 2.5) public key management, and provide  ... 
doi:10.1016/j.adhoc.2016.02.014 fatcat:ientjgfsgbavnkmwc25gwzfn3e

Official Arbitration with Secure Cloud Storage Application

A. Kupcu
2013 Computer journal  
We show that it is easy to extend our official arbitration protocols for a general case, including dynamic authenticated data structures.  ...  Static and dynamic proof of storage schemes have been proposed for use in secure cloud storage scenarios.  ...  Chris Erway, and Charalampos Papamanthou for their useful discussions during the initial phases of this paper.  ... 
doi:10.1093/comjnl/bxt138 fatcat:2nox44evqzdglhcxtjht4cqo6q

A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market

Aklilu Daniel Tesfamicael, Vicky Liu, Matthew McKague, William Caelli, Ernest Foo
2020 IEEE Access  
Energy market trading systems are undergoing rapid transformation due to an increasing demand for renewable energy sources to be integrated into the power grid, coupled with the dynamic and evolving needs  ...  Although blockchain technology has been studied for energy trading on a peer-to-peer microgrid trading, to our knowledge none of the previous work focused on using blockchain for trading energy in a national  ...  Bob Maczkowiack for taking the time to review the manuscript. They would also like to thank his invaluable comments and editing work on this study.  ... 
doi:10.1109/access.2020.3009356 fatcat:wvtdddn44zcsjafd2mbmlucege

Towards Large-Scale and Privacy-Preserving Contact Tracing in COVID-19 pandemic: A Blockchain Perspective

Wenzhe Lv, Sheng Wu, Chunxiao Jiang, Yuanhao Cui, Xuesong Qiu, Yan Zhang
2020 IEEE Transactions on Network Science and Engineering  
Specifically, 1) a privacy-preserving SRC protocol for activity-tracking and corresponding generalized block structure is developed, by connecting an interactive zero-knowledge proof protocol and the key  ...  Meanwhile, the owner of the on-chain location data can still claim its ownership without revealing the private key to anyone else. 2) An artificial potential field-based incentive allocation mechanism  ...  In our protocol, a key escrow is employed for the prover to achieve the separation of identity information and location information.  ... 
doi:10.1109/tnse.2020.3030925 pmid:35582326 pmcid:PMC8905609 fatcat:oagboccewvct7amrb2opax4nom

Smart Contract-Based Cross-Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks

Guangsong Li, Yang Wang, Bin Zhang, Siqi Lu
2020 Mobile Information Systems  
In this paper, we propose a cross-domain authentication and key agreement system based on smart contract of blockchains.  ...  On this basis, a cross-domain authentication and key agreement protocol is designed.  ...  In 2018, a novel group key management protocol [15] for cross-domain dynamic anonymous authentication was proposed to realize cross-domain secure anonymous group communication.  ... 
doi:10.1155/2020/2964562 fatcat:2gbljxcoczgmllymgvbpagu4qa
« Previous Showing results 1 — 15 out of 400 results