[go: up one dir, main page]

Zhao et al., 2010 - Google Patents

Provably secure authenticated key exchange protocol under the CDH assumption

Zhao et al., 2010

Document ID
2551993471535310393
Author
Zhao J
Gu D
Publication year
Publication venue
Journal of Systems and Software

External Links

Snippet

Constructing a secure key exchange protocol is one of the most challenging problems in information security. We propose a provably secure two-round two-party authenticated key exchange (2AKE) protocol based on the well-studied CDH assumption in eCK model to …
Continue reading at www.sciencedirect.com (other versions)

Similar Documents

Publication Publication Date Title
Zheng et al. PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications
Wang et al. Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices
CN112106322B (en) Password-based threshold token generation
Islam Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps
Cao et al. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
Wu et al. A new provably secure authentication and key agreement protocol for SIP using ECC
Miao et al. Secure multi-server-aided data deduplication in cloud computing
Gupta et al. A novel and efficient lattice‐based authenticated key exchange protocol in C‐K Model
Islam et al. Provably secure and anonymous password authentication protocol for roaming service in global mobility networks using extended chaotic maps
Dang et al. Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks
Li et al. A provably secure and lightweight identity‐based two‐party authenticated key agreement protocol for vehicular ad hoc networks
Gupta et al. An ECC‐based authenticated group key exchange protocol in IBE framework
Sun et al. A novel remote user authentication and key agreement scheme for mobile client-server environment
Mandal et al. CL-AGKA: Certificateless authenticated group key agreement protocol for mobile networks
Galbraith Authenticated key exchange for SIDH
Kumar et al. Learning with error‐based key agreement and authentication scheme for satellite communication
Islam et al. An anonymous and provably secure authentication scheme for mobile user
Xiong et al. Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
Ghosh et al. Post-Quantum Forward-Secure Onion Routing: (Future Anonymity in Today’s Budget)
Gebremichael et al. Lightweight iot group key establishment scheme using one-way accumulator
Naresh et al. Provably secure group key agreement protocol based on ECDH with integrated signature
Yasmin et al. Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks
Zhao et al. Provably secure authenticated key exchange protocol under the CDH assumption
Lee et al. Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
Kumari et al. A resilient group session key authentication methodology for secured peer to peer networks using zero knowledge protocol