Zhao et al., 2010 - Google Patents
Provably secure authenticated key exchange protocol under the CDH assumptionZhao et al., 2010
- Document ID
- 2551993471535310393
- Author
- Zhao J
- Gu D
- Publication year
- Publication venue
- Journal of Systems and Software
External Links
Snippet
Constructing a secure key exchange protocol is one of the most challenging problems in information security. We propose a provably secure two-round two-party authenticated key exchange (2AKE) protocol based on the well-studied CDH assumption in eCK model to …
- 241001466737 Scopus 0 description 19
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zheng et al. | PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications | |
| Wang et al. | Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices | |
| CN112106322B (en) | Password-based threshold token generation | |
| Islam | Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps | |
| Cao et al. | A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges | |
| Wu et al. | A new provably secure authentication and key agreement protocol for SIP using ECC | |
| Miao et al. | Secure multi-server-aided data deduplication in cloud computing | |
| Gupta et al. | A novel and efficient lattice‐based authenticated key exchange protocol in C‐K Model | |
| Islam et al. | Provably secure and anonymous password authentication protocol for roaming service in global mobility networks using extended chaotic maps | |
| Dang et al. | Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks | |
| Li et al. | A provably secure and lightweight identity‐based two‐party authenticated key agreement protocol for vehicular ad hoc networks | |
| Gupta et al. | An ECC‐based authenticated group key exchange protocol in IBE framework | |
| Sun et al. | A novel remote user authentication and key agreement scheme for mobile client-server environment | |
| Mandal et al. | CL-AGKA: Certificateless authenticated group key agreement protocol for mobile networks | |
| Galbraith | Authenticated key exchange for SIDH | |
| Kumar et al. | Learning with error‐based key agreement and authentication scheme for satellite communication | |
| Islam et al. | An anonymous and provably secure authentication scheme for mobile user | |
| Xiong et al. | Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys | |
| Ghosh et al. | Post-Quantum Forward-Secure Onion Routing: (Future Anonymity in Today’s Budget) | |
| Gebremichael et al. | Lightweight iot group key establishment scheme using one-way accumulator | |
| Naresh et al. | Provably secure group key agreement protocol based on ECDH with integrated signature | |
| Yasmin et al. | Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks | |
| Zhao et al. | Provably secure authenticated key exchange protocol under the CDH assumption | |
| Lee et al. | Provably secure extended chaotic map-based three-party key agreement protocols using password authentication | |
| Kumari et al. | A resilient group session key authentication methodology for secured peer to peer networks using zero knowledge protocol |