Articles with "key exchange" as a keyword



Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-016-3667-0

Abstract: Yoking proof is a very useful security primitive that can be used to prove the co-existence of two or multiple entities in an identification protocol. It can be incorporated into radio frequency identification (RFID) protocols… read more here.

Keywords: proof; proof key; key exchange; privacy ... See more keywords

New constructions for (multiparty) one-round key exchange with strong security

Sign Up to like & get
recommendations!
Published in 2017 at "Science China Information Sciences"

DOI: 10.1007/s11432-017-9177-7

Abstract: Dear editor, One-round key exchange (ORKE) represents a special class of two-message key exchange. It enables two parties to establish a shared session key within only one communication round. The first merit of ORKE is… read more here.

Keywords: one round; round key; key exchange; security ... See more keywords

An efficient certificateless user authentication and key exchange protocol for client-server environment

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-017-0622-1

Abstract: Identity-based user authentication protocols have been presented to be applicable to resource-constrained devices such as mobile phones. Unfortunately, the previous protocols have the drawback of the key escrow problem. A new protocol of a user… read more here.

Keywords: protocol; user authentication; key exchange; client server ... See more keywords

Cryptanalysis of a key exchange protocol based on a digital semiring

Sign Up to like & get
recommendations!
Published in 2025 at "Communications in Algebra"

DOI: 10.1080/00927872.2025.2509119

Abstract: Abstract This paper is devoted to tropical cryptography, a branch of non-commutative cryptography that uses tropical structures as platforms for cryptographic protocols. In this paper, we focus on the key exchange scheme based on a… read more here.

Keywords: protocol; digital semiring; based digital; key exchange ... See more keywords

2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2844190

Abstract: With the increasing use of mobile devices, a secure communication and key exchange become the significant security issues in mobile environments. However, because of open network environments, mobile user can be vulnerable to various attacks.… read more here.

Keywords: authentication; security; key exchange; efficient two ... See more keywords

Design and Implementation of Constant-Round Dynamic Group Key Exchange from RLWE

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2993296

Abstract: Group Key Exchange (GKE) is required for secure group communication with high confidentiality. In particular, a trusted authority can handle issues that happen by the malicious actions of group members, but it is expensive to… read more here.

Keywords: implementation; constant round; key exchange; group ... See more keywords

D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie–Hellman Key Exchange

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2023.3347422

Abstract: In this paper, D(HE)at, a practical denial-of-service (DoS) attack targeting the finite field Diffie-Hellman (DH) key exchange protocol, is presented, allowing remote users to send non-public keys to the victim, triggering expensive server-side DH modular-exponentiation… read more here.

Keywords: attack; diffie hellman; key exchange;

BRAKE: Biometric Resilient Authenticated Key Exchange

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3380915

Abstract: Biometric data are uniquely suited for connecting individuals to their digital identities. Deriving cryptographic key exchange from successful biometric authentication therefore gives an additional layer of trust compared to password-authenticated key exchange. However, biometric data… read more here.

Keywords: biometric resilient; key exchange; resilient authenticated; authenticated key ... See more keywords

LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3085595

Abstract: Ensuring security and privacy in the Internet of Things (IoT) while taking into account the resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT applications, remote users (RUs) need to communicate securely… read more here.

Keywords: key exchange; lightweight user; lake 6sh; 6lowpan based ... See more keywords

Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2025.3549981

Abstract: Intelligent supply line surveillance is critical for modern smart grids (SGs). Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuously and transmit it to the… read more here.

Keywords: supply line; surveillance; line surveillance; key exchange ... See more keywords

After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2017.2685524

Abstract: Authenticated key exchange (AKE) scheme is one of the most widely used cryptographic primitives in practice, even in the Internet-of-Things (IoT) environments. In order to resist side-channel attacks, several works have been proposed for defining… read more here.

Keywords: leakage resilient; ake; identity based; authenticated key ... See more keywords