352,214 Hits in 4.7 sec

A secure control protocol for USB mass storage devices

Fuw-Yi Yang, Tzung-Da Wu, Su-Hui Chiu
2010 IEEE transactions on consumer electronics  
This study proposes a secure control protocol which provides mutual authentication and key agreement between client and server to solve this problem 1 .  ...  Index Terms -Diffie-Hellman key exchange, digital signature, key agreement, mutual authentication, storage device, Universal Serial Bus (USB).  ...  PROPOSED SCHEME To effectively prevent the theft of information via USB storage devices, we designed a control protocol to provide user authentication and key agreement.  ... 
doi:10.1109/tce.2010.5681109 fatcat:heynfrrrifgzne34zjgxqybxre

Energy-Efficient Group Key Agreement for Wireless Networks

Thomas R. Halford, Thomas A. Courtade, Keith M. Chugg, Xiaochen Li, Gautam Thatte
2015 IEEE Transactions on Wireless Communications  
To fully realize public key cryptography in these networks, lightweight PKAs should be augmented with energy-efficient mechanisms for group key agreement.  ...  We present a protocol that uses session keys derived from those master keys to establish a group key that is information-theoretically secure.  ...  Fig. 4 . 4 Number of public multicast transmissions required for group key agreement via the proposed protocol when 50/β master keys are loaded randomly in a 50-client network.  ... 
doi:10.1109/twc.2015.2439675 fatcat:mqtamz4re5awjdr7zabjubxni4

A Lightweight Authentication and Key Agreement Schemes for IoT Environments

Dae-Hwi Lee, Im-Yeong Lee
2020 Sensors  
The second scheme is also an authentication and key agreement scheme that can be used more securely, but slower than first scheme using certificateless public key cryptography (CL-PKC).  ...  The first scheme is an authentication and key agreement scheme with limited resource devices that can use the elliptic curve Qu-Vanstone (ECQV) implicit certificate to quickly agree on the session key.  ...  Our two schemes are key agreement protocols, and implicit certificates are issued via ECQV, as in previous works.  ... 
doi:10.3390/s20185350 pmid:32961979 pmcid:PMC7570713 fatcat:qmiice64mje4zilgsqeogsxdry

SPACE: Secure Protocol for Address Book based Connection Establishment

Ganesh Ananthanarayanan, Ramarathnam Venkatesan, Prasad Naldurg, Sean Olin Blagsvedt, Adithya Hemakumar
2006 ACM Workshop on Hot Topics in Networks  
In addition, these protocols require explicit user intervention, like entering a passkey.  ...  We show how our protocol is resistant to specific security attacks and can accommodate for privacy concerns.  ...  In the first connection instance, Alice and Bob establish a shared secret key between them using the Elliptic Curve Diffie Hellman key agreement protocol [6] via SMS messages.  ... 
dblp:conf/hotnets/Ananthanarayanan06 fatcat:mqmny5upgzahdhltrpxjii54gy

Improved authenticated multiple-key agreement protocol

Sung-Ming Yen, M. Joye
1998 Electronics Letters  
Authenticated key agreement protocol: In [1], Harn and Lin developed a two-phase authenticated key agreement protocol which enables two parties to share multiple secret keys.  ...  Recently, Harn and Lin (1998) developed a two-phase authenticated key agreement protocol which enables two parties to share multiple secret keys.  ...  Authenticated key agreement protocol: In [1] , Harn and Lin developed a two-phase authenticated key agreement protocol which enables two parties to share multiple secret keys.  ... 
doi:10.1049/el:19981159 fatcat:j7zteorbebbgbi4exeztpwo3ma

Secure key establishment for Device-to-Device communications

Wenlong Shen, Weisheng Hong, Xianghui Cao, Bo Yin, Devu Manikantan Shila, Yu Cheng
2014 2014 IEEE Global Communications Conference  
Our approach is based on the Diffie-Hellman key agreement protocol and commitment schemes. Compared to previous work, our proposed protocol introduces less communication and computation overhead.  ...  In this paper, we investigate the security requirements and challenges for D2D communications, and present a secure and efficient key agreement protocol, which enables two mobile devices to establish a  ...  Protocol Design Here we present our design of the key agreement protocol, which is based on the traditional Diffie-Hellman key agreement protocol and a commitment scheme.  ... 
doi:10.1109/glocom.2014.7036830 dblp:conf/globecom/ShenHCYSC14 fatcat:muyf6ezlqbfypnff5xde632zxq

Improving The Key Agreement Protocol Security Based On Hadamard Matrices

Ali Zaghian, Mohammad Jafar Hashemi, Ahmad Majlesi
2014 Journal of Mathematics and Computer Science  
In short, new symmetric key agreement protocol will be suitable for insecure communication when two users want to share a common secret key with the low computing power.  ...  In this paper, the security of key agreement protocol based on Sylvester Hadamard matrices proposed by Chang-hui Choe and Moon Ho Lee has been improved.  ...  Key Agreement Protocol Using Silvester Hadamard Matrices and weakness In this section, the key agreement protocol proposed by Chang-hui Choe and Moon Ho Lee has been described.  ... 
doi:10.22436/jmcs.012.04.07 fatcat:6aq4aealgreizoivtbjsnznqoq

Multiparty key agreement protocols

J. Pieprzyk, C.-H. Li
2000 IEE Proceedings - Computers and digital Techniques  
Two key agreement protocols are discussed. The first is the group key agreement where all principals must be active to call the conference.  ...  agreement protocols based on secret sharing is presented.  ...  The validity of the concept was illustrated on an example showing how two principals may agree on a secret key via a public negotiation. This is a classical key agreement protocol.  ... 
doi:10.1049/ip-cdt:20000531 fatcat:efdzt3vtabcifhsmdfozof3g54

The TLS Handshake Protocol: A Modular Analysis

P. Morrissey, N. P. Smart, B. Warinschi
2009 Journal of Cryptology  
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol.  ...  Our proofs shows that the protocol is secure even if the pre-master and the master keys only satisfy only weak security requirements.  ...  Acknowledgements The authors would like to thank Caroline Belrose for various discussions on key agreement protocols during the writing of this paper and Martin Abadi for interesting insights into various  ... 
doi:10.1007/s00145-009-9052-3 fatcat:vjht4j55wjcm5ltnhnos5sbds4

Modular Security Proofs for Key Agreement Protocols [chapter]

Caroline Kudla, Kenneth G. Paterson
2005 Lecture Notes in Computer Science  
The security of key agreement protocols has traditionally been notoriously hard to establish.  ...  In this paper we present a modular approach to the construction of proofs of security for a large class of key agreement protocols.  ...  during a key agreement protocol, and this key derivation function is usually implemented via a hash function.  ... 
doi:10.1007/11593447_30 fatcat:5c66dwfjvnhm3lzerixyokosse

Non-abelian key agreement protocols

Iris Anshel, Michael Anshel, Dorian Goldfeld
2003 Discrete Applied Mathematics  
In particular, it is shown that well known hard problems in group theory can be used to generate key agreement protocols.  ...  A key-agreement protocol (KAP) is a multi-party algorithm deÿned by a sequence of steps specifying the actions required for two or more individuals to each obtain a shared secret.  ...  Suppose S A is generated by the elements We now compare the well-known Di e-Hellman key agreement protocol and the new non-abelian key agreement protocol.  ... 
doi:10.1016/s0166-218x(02)00585-1 fatcat:6odjnkzknfhh5m752mx6wl7xh4

Energy-efficient, secure group key agreement for ad hoc networks

Thomas R. Halford, Thomas A. Courtade, Keith M. Chugg
2013 2013 IEEE Conference on Communications and Network Security (CNS)  
A cryptosystem employing an energy-efficient PKA and the protocols presented herein could provide the benefits of public key cryptography -i.e., dynamic ad hoc network support -with features currently  ...  Motivated by recent results on information theoretic secrecy, we present a protocol that generates keys for t-sized multicast groups with O(log b t) transmissions, where b is a parameter that enables trades  ...  Existing group key agreement protocols, wherein the destinations cooperatively establish a key via messaging, also require O(t) transmissions (cf., [10] ).  ... 
doi:10.1109/cns.2013.6682706 dblp:conf/cns/HalfordCC13 fatcat:2yelk3fcwffz7fg4sgeq3ljcpe

A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols [chapter]

Colleen Swanson, David Jao
2009 Lecture Notes in Computer Science  
We survey the set of all prior two-party certificateless key agreement protocols available in the literature at the time of this work.  ...  In order to describe our results rigorously, we introduce the first known formal security model for two-party authenticated certificateless key agreement protocols.  ...  is a key agreement protocol (KAP).  ... 
doi:10.1007/978-3-642-10628-6_4 fatcat:rerln3zqmvhxjhm2sw34ou24ly

Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications

Mingjun Wang, Zheng Yan
2018 IEEE Transactions on Industrial Informatics  
In this paper, we propose two Privacy-Preserving Authentication and Key Agreement protocols (PPAKA-HAMC and PPAKA-IBS) to guarantee secure and anonymous D2D group communications.  ...  In our protocols, a group of D2D users mutually authenticate with each other without leaking their identity information while negotiate a common D2D group session key for secure communications in a D2D  ...  authentication and key agreement protocol is proposed for session establishment.  ... 
doi:10.1109/tii.2017.2778090 fatcat:bc5r2cj72nggpdwe2qazs2v7xm

New Authentication and Key Agreement Protocol for LTE-WLAN Interworking

Ahmed H.Hassanein, Ahmed A. Abdel Hafez, Abd El-Hamid A. Gaafar
2013 International Journal of Computer Applications  
To provide secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) is used.  ...  This paper analyzes vulnerabilities in LTE-WLAN interworking and proposes a new authentication and key agreement protocol based on EAP-AKA. Keywords LTE, Interworking, 3G-WLAN.  ...  agreement is successful and the UE can use WLAN services securely via the MSK.  ... 
doi:10.5120/10036-4937 fatcat:2vb4nla4zvf33a4mh2kgvch6c4
« Previous Showing results 1 — 15 out of 352,214 results