Filters








7,212 Hits in 5.4 sec

SAS-Based Group Authentication and Key Agreement Protocols [chapter]

Sven Laur, Sylvain Pasini
Public Key Cryptography – PKC 2008  
We give a new group message authentication protocol that utilises only limited authenticated communication and show how to combine this protocol with classical key agreement procedures.  ...  New trends in consumer electronics have created a strong demand for fast, reliable and user-friendly key agreement protocols.  ...  It allows building of secure SAS-based group key agreements, as presented in the last section.  ... 
doi:10.1007/978-3-540-78440-1_12 dblp:conf/pkc/LaurP08 fatcat:nvui6g4tazc2jdkqyqmbk7q45y

Authenticated group key agreement and friends

Giuseppe Ateniese, Michael Steiner, Gene Tsudik
1998 Proceedings of the 5th ACM conference on Computer and communications security - CCS '98  
This paper studies the problem of authenticated key agreement in dynamic peer groups with the emphasis on e cient and provably secure key authentication, key con rmation and integrity.  ...  It begins by considering 2-party a uthenticated key agreement and extends the results to Group Di e-Hellman key agreement.  ...  Reiter and the anonymous referees.  ... 
doi:10.1145/288090.288097 dblp:conf/ccs/AtenieseST98 fatcat:sapov3h2czaorbcljchwyx2awa

Authenticated key agreement in dynamic peer groups

Xun Yi
2004 Theoretical Computer Science  
In this paper, we propose a new authenticated key agreement protocol, composed of a basic protocol and a dynamic protocol, for dynamic peer groups.  ...  In order to secure communications in dynamic peer groups, authenticated key agreement protocols are required.  ...  Such a protocol is called authenticated group key agreement protocol. Some authenticated group key agreement protocols can be found in [1, 3, 16] .  ... 
doi:10.1016/j.tcs.2004.08.001 fatcat:xf424q3vdzaafijgejd5xci76q

New multiparty authentication services and key agreement protocols

G. Ateniese, M. Steiner, G. Tsudik
2000 IEEE Journal on Selected Areas in Communications  
It begins by considering 2-party authenticated key agreement and extends the results to Group Di e-Hellman key agreement.  ...  This paper studies the problem of authenticated key agreement in dynamic peer groups with the emphasis on e cient a n d p r o vably secure key authentication, key con rmation and integrity.  ...  Waidner and M. Reiter.  ... 
doi:10.1109/49.839937 fatcat:x6e7kzgtd5afrda5q6xj3pc6ue

Key handling in wireless sensor networks

Y Li, T Newe
2007 Journal of Physics, Conference Series  
In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols  ...  Such protocols can employ private-key and/or public key cryptographic algorithms.  ...  Group Key Agreement Protocols A group key agreement protocol relies on shared long-term keys between participants and servers in order to allow participants to construct a group key.  ... 
doi:10.1088/1742-6596/76/1/012060 fatcat:tv3pre2mfzf3lofzsriyawbq7a

An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings [chapter]

Eun-Kyung Ryu, Eun-Jun Yoon, Kee-Young Yoo
2004 Lecture Notes in Computer Science  
In this paper, we describe a new ID-based authenticated key agreement protocol that makes use of bilinear pairings.  ...  We also show that it is more efficient than Chen and Kudla's protocol with same security properties as ours.  ...  The Protocol In this section we demonstrate a new ID-based authenticated key agreement protocol. This protocol consists of two phases: system setup and authenticated key agreement.  ... 
doi:10.1007/978-3-540-24693-0_135 fatcat:gbzsirzrjjfxhcyigfi3tbplqu

Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients

Ford Long Wong, Hoon Wei Lim
2007 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)  
We propose a four-party password authenticated interdomain key exchange protocol which makes use of properties of identity-based cryptography and secret public keys.  ...  Being password-based and certificate-free, our protocol is lightweight and is suited to lightweight computing environments, such as pervasive computing.  ...  They proposed two four-party password-based authenticated key establishment protocols, which are based on key transport and key agreement techniques, respectively.  ... 
doi:10.1109/ainaw.2007.203 dblp:conf/aina/WongL07 fatcat:3tn4qt47wzcdnoqgaszgl74oo4

User-aided data authentication

Sven Laur, Sylvain Pasini
2009 International Journal of Security and Networks (IJSN)  
In this paper, we study the corresponding user-aided message authentication and key agreement protocols.  ...  All classical authentication protocols are based on pre-shared authentic information such as long-term secret keys or a public key infrastructure.  ...  Acknowledgments Partially supported by the Academy of Finland and by the Estonian Doctoral School in Information and Communication Technology.  ... 
doi:10.1504/ijsn.2009.023427 fatcat:7oyxukrharalrewf3d7a4amdjy

ENHANCED VERIFIER-BASED PASSWORD AUTHENTICATED KEY AGREEMENT PROTOCOL FOR THREE-PARTIES

Dina Nabil Shaban, Maged H. Ibrahim, Zaki B.Nossair
2008 JES. Journal of Engineering Sciences  
In this paper we present an efficient verifier-based password authenticated key agreement protocol for three-parties.  ...  Most of password authenticated key agreement protocols have focused on the two-party setting where two communicating parties share a password.  ...  Password-authenticated key agreement protocols provide a new and unique way to authenticate parties and derive high-quality cryptographic keys from lowentropy passwords.  ... 
doi:10.21608/jesaun.2008.119612 fatcat:3x62g2yip5b4xnea3hoacmhki4

Secure ad hoc trust initialization and key management in wireless body area networks

Ming Li, Shucheng Yu, Joshua D. Guttman, Wenjing Lou, Kui Ren
2013 ACM transactions on sensor networks  
In this article, we propose group device pairing (GDP), a user-aided multi-party authenticated key agreement protocol.  ...  The GDP supports fast batch deployment, addition and revocation of sensor devices, does not rely on any additional hardware device, and is mostly based on symmetric key cryptography.  ...  Laur and Pasini [2008] proposed a group message authentication and key agreement protocol (SAS-GAKA) based on comparison of short authentication strings (SAS).  ... 
doi:10.1145/2422966.2422975 fatcat:bqw7mfzfqvdenlx4dhl35wscpq

Downgrade Resilience in Key-Exchange Protocols

Karthikeyan Bhargavan, Christina Brzuska, Cedric Fournet, Matthew Green, Markulf Kohlweiss, Santiago Zanella-Beguelin
2016 2016 IEEE Symposium on Security and Privacy (SP)  
Key-exchange protocols such as TLS, SSH, IPsec, and ZRTP are highly congurable, with typical deployments supporting multiple protocol versions, cryptographic algorithms and parameters.  ...  In the rst messages of the protocol, the peers negotiate one specic combination: the protocol mode, based on their local congurations.  ...  The TLS 1.3 downgrade countermeasures were formulated in collaboration with Eric Rescorla, Martin Thomson, and the TLS working group. Bhargavan is funded by the ERC grants CRYSP and CIRCUS.  ... 
doi:10.1109/sp.2016.37 dblp:conf/sp/BhargavanBF0KB16 fatcat:r6en3klrojbuxkc7aekyehmk6m

Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model [chapter]

Stanisław Jarecki, Nitesh Saxena
2010 Lecture Notes in Computer Science  
The main practical application of a SAS-MA protocol is Authenticated Key Agreement (AKA) in this communication model, i.e. SAS-AKA, which can be used for so-called "pairing" of wireless devices.  ...  A SAS-MA protocol authenticates arbitrarily long messages sent over insecure channels as long as the sender and the receiver can additionally send a very short, e.g. 20 bit, authenticated message to each  ...  If commitment scheme is (T C , C )-NM and encryption scheme is (T E , E )-SS-CCA, then the Enc-AKA protocol is (T, p)-secure against (n, τ t , τ c )-attacker for p ≥ 2nτ t τ c (2 −k + max( C , E ) and  ... 
doi:10.1007/978-3-642-15317-4_17 fatcat:4kgevrsatjghvg5ohcgok7z2qy

Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks

Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren
2010 2010 Proceedings IEEE INFOCOM  
A group of sensor nodes, having no prior shared secrets before they meet, establish initial trust through group device pairing (GDP), which is an authenticated group key agreement protocol where the legitimacy  ...  The GDP supports batch deployment of sensor nodes to save setup time, does not rely on any additional hardware devices, and is mostly based on symmetric key cryptography, while allowing batch node addition  ...  This work was supported in part by the US National Science Foundation under grants CNS-0716306, CNS-0831628, CNS-0746977, and CNS-0831963.  ... 
doi:10.1109/infcom.2010.5462095 dblp:conf/infocom/LiYLR10 fatcat:y3hicivdcvd7rbewfiquq7e2we

A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol

Zisang Xu, Feng Li, Han Deng, Minfu Tan, Jixin Zhang, Jianbo Xu
2020 Sensors  
Therefore, this paper proposes a blockchain-based authentication and dynamic group key agreement protocol.  ...  Most existing group key agreement protocols are often flawed in performance, scalability, forward or backward secrecy, or single node failure.  ...  Conclusions This paper proposes a blockchain-based authentication and dynamic group key agreement protocol.  ... 
doi:10.3390/s20174835 pmid:32867074 fatcat:l4dbzelpgjgipaqo6eefr2ql34

Efficient Authenticated Key Agreement Protocol for Dynamic Groups [chapter]

Kui Ren, Hyunrok Lee, Kwangjo Kim, Taewhan Yoo
2005 Lecture Notes in Computer Science  
In this paper, we propose an efficient group authenticated key agreement protocol (EGAKA), which is designed to be fully distributed and fault-tolerant, provides efficient dynamic group membership management  ...  , mutual authentication among group members and is secure against both passive and active attacks.  ...  Note that key establishment and authentication issues are not explicitly discussed in TGDH. Another protocol by Yang et al. [29] is an ID-based authenticated group key agreement protocol.  ... 
doi:10.1007/978-3-540-31815-6_13 fatcat:lvxk3b6gurhhpcmhvj6b66slhy
« Previous Showing results 1 — 15 out of 7,212 results