Articles with "key exchange" as a keyword



Photo from wikipedia

Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-016-3667-0

Abstract: Yoking proof is a very useful security primitive that can be used to prove the co-existence of two or multiple entities in an identification protocol. It can be incorporated into radio frequency identification (RFID) protocols… read more here.

Keywords: proof; proof key; key exchange; privacy ... See more keywords
Photo by hudsoncrafted from unsplash

New constructions for (multiparty) one-round key exchange with strong security

Sign Up to like & get
recommendations!
Published in 2017 at "Science China Information Sciences"

DOI: 10.1007/s11432-017-9177-7

Abstract: Dear editor, One-round key exchange (ORKE) represents a special class of two-message key exchange. It enables two parties to establish a shared session key within only one communication round. The first merit of ORKE is… read more here.

Keywords: one round; round key; key exchange; security ... See more keywords
Photo by hudsoncrafted from unsplash

An efficient certificateless user authentication and key exchange protocol for client-server environment

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-017-0622-1

Abstract: Identity-based user authentication protocols have been presented to be applicable to resource-constrained devices such as mobile phones. Unfortunately, the previous protocols have the drawback of the key escrow problem. A new protocol of a user… read more here.

Keywords: protocol; user authentication; key exchange; client server ... See more keywords
Photo by scottwebb from unsplash

2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2844190

Abstract: With the increasing use of mobile devices, a secure communication and key exchange become the significant security issues in mobile environments. However, because of open network environments, mobile user can be vulnerable to various attacks.… read more here.

Keywords: authentication; security; key exchange; efficient two ... See more keywords
Photo from wikipedia

Design and Implementation of Constant-Round Dynamic Group Key Exchange from RLWE

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2993296

Abstract: Group Key Exchange (GKE) is required for secure group communication with high confidentiality. In particular, a trusted authority can handle issues that happen by the malicious actions of group members, but it is expensive to… read more here.

Keywords: implementation; constant round; key exchange; group ... See more keywords
Photo by aaronburden from unsplash

LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3085595

Abstract: Ensuring security and privacy in the Internet of Things (IoT) while taking into account the resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT applications, remote users (RUs) need to communicate securely… read more here.

Keywords: key exchange; lightweight user; lake 6sh; 6lowpan based ... See more keywords
Photo by dropthelabelmovement from unsplash

After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2017.2685524

Abstract: Authenticated key exchange (AKE) scheme is one of the most widely used cryptographic primitives in practice, even in the Internet-of-Things (IoT) environments. In order to resist side-channel attacks, several works have been proposed for defining… read more here.

Keywords: leakage resilient; ake; identity based; authenticated key ... See more keywords
Photo from wikipedia

An Efficient One-Way Authenticated Key Exchange Protocol for Anonymity Networks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2020.2986506

Abstract: Authenticated key exchange (AKE) is a crucial cryptographic primitive used for establishing an authenticated and confidential communication channel between parties, which has been widely used in our daily life when we surf on the Internet.… read more here.

Keywords: one way; key exchange; anonymity; authenticated key ... See more keywords
Photo by creedi from unsplash

Post-Quantum Key Exchange on ARMv8-A: A New Hope for NEON Made Simple

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2017.2773524

Abstract: NewHope and NewHope-Simple are two recently proposed post-quantum key exchange protocols based on the hardness of the Ring-LWE problem. Due to their high security margins and performance, there have already been discussions and proposals for… read more here.

Keywords: post quantum; key exchange; neon; exchange ... See more keywords

Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2018.2808527

Abstract: Ring Learning With Errors (RLWE)-based key exchange is one of the most efficient and secure primitive for post-quantum cryptography. One common approach to achieve key exchange over RLWE is error reconciliation. Recently, an efficient attack… read more here.

Keywords: attack; based key; rlwe based; key exchange ... See more keywords
Photo from wikipedia

Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2018.2833119

Abstract: Although postquantum cryptography is of growing practical concern, not many works have been devoted to implementation security issues related to postquantum schemes. In this paper, we look in particular at fault attacks against implementations of… read more here.

Keywords: exchange protocols; key exchange; lattice based; signature schemes ... See more keywords