搜索结果: 1-15 共查到“军事学 Authenticated Key Exchange Protocol”相关记录22条 . 查询时间(0.122 秒)
Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error
Key Exchange Three-Party PAKE Lattice
2017/4/27
Three-party Password Authenticated Key Exchange (3PAKE) protocol is an important cryptographic primitive, where clients can establish a session key using easy-to-remember passwords. A number of 3PAKE ...
Comments on “Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof”
public-key cryptography Security Analysis
2016/12/15
In CT-RSA 2016, Chen, Mu, Yang, Susilo and Guo proposed a strongly leakage-resilient authenticated key exchange (AKE) protocol. In a rencent work, Chakraborty et al. claimed that they identified a fla...
Two-party authenticated key exchange protocol using lattice-based cryptography
Authenticated key exchange ring learning with errors
2016/12/10
Authenticated key exchange (AKE) protocol is an important cryptographic primitive that assists communicating entities, who are communicating over an insecure network, to establish a shared session key...
Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof
Authenticated Key Exchange DDH GDH
2016/12/9
In this paper, we revisit the security result of an authenticated key exchange (AKE) protocol recently proposed in CT-RSA 2016 by Chen, Mu, Yang, Susilo and Guo (we refer to this scheme as the CMYSG s...
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers
Trusted Platform Module identity-based authenticated key exchange
2016/4/7
Security of a key exchange protocol is formally established through an abstract game between a challenger and an adversary. In this game the adversary can get various information which are modeled by ...
On the Security of One Password Authenticated Key Exchange Protocol
cryptographic protocols key establishment PAKE protocols
2016/1/26
In this paper the Security Evaluated Standardized Password Authenticated Key Exchange
( SESPAKE ) protocol is proposed (this protocol is approved in the standardization
system of the Russian Federat...
FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes
Authenticated Key Exchange Protocol Forward Security Key Evolving Schemes
2016/1/25
This paper suggests a model and a definition for forward-secure authenticated key exchange
(AKE) protocols, which can be satisfied without depending on the Diffie-Hellman assumption.
The basic idea ...
IBAKE: Identity-Based Authenticated Key Exchange Protocol
cryptographic protocols / Identity-based Authenticated Key Exchange
2012/6/14
The past decade has witnessed a surge in exploration of cryptographic concepts based on pairings over Elliptic Curves. In particular, identity-based cryptographic protocols have received a lot of atte...
IBAKE: Identity-Based Authenticated Key Exchange Protocol
cryptographic protocols / Identity-based Authenticated Key Exchange
2012/3/22
The past decade has witnessed a surge in exploration of cryptographic concepts based on pairings over Elliptic Curves. In particular, identity-based cryptographic protocols have received a lot of atte...
IBAKE: Identity-Based Authenticated Key Exchange Protocol
cryptographic protocols Identity-based Authenticated Key Exchange
2012/3/21
The past decade has witnessed a surge in exploration of cryptographic concepts based on pairings over Elliptic Curves. In particular, identity-based cryptographic protocols have received a lot of atte...
Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
Authenticated key exchange eCK model Perfect forward security Provably secure
2011/7/25
This paper investigates the two-pass authenticated key exchange protocol in the enhanced Canetti-Krawczyk (eCK) with perfect forward security.
Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
cryptographic protocols
2012/3/27
This paper investigates the two-pass authenticated key exchange protocol in the enhanced Canetti-Krawczyk (eCK) with perfect forward security. Currently, there exist no authenticated key exchange prot...
Generic Execution State Synchronization Framework for Authenticated Key Exchange Protocol
authenticated key exchange impersonation detection state synchronization
2011/2/23
Nowadays, most of sensitive applications over insecure network are protected by some authenticated secure channel which is highly relies on specific authenticated key exchange (AKE) protocol. Neverthe...
Weakness of a three-party password-based authenticated key exchange protocol
password-based authenticated key exchange three-party
2009/11/18
To guarantee the quality of the growing popular
communication services, quite recently, Huang presented a simple
and efficient three-party password-based authenticated key
exchange protocol in Inte...
Weaknesses and improvement of three-party authenticated key exchange protocol using elliptic curve cryptography
unknown key-share attack impersonation attack three-party
2009/11/18
Quite recently, Yang et al. presented an efficient three-party authenticated key ex-
change protocol based upon elliptic curve cryptography for mobile-commerce envi-
ronments. In this paper, we demo...