搜索结果: 1-15 共查到“军队指挥学 Tripartite”相关记录17条 . 查询时间(0.031 秒)
Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols
Key agreement Tripartite Identitybased
2014/3/5
Key agreement allows multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. In recent years, several identity-based au...
A modified eCK model with stronger security for tripartite authenticated key exchange
Zhengzhou Information Science and Technology Institute
2010/2/1
Since Bellare and Rogaway presented the first formal security model for
authenticated key exchange (AKE) protocols in 1993, many formal security
models have been proposed. The extended Canetti-Krawc...
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols
Postponed ephemeral keys pseudo-static keys tripartite key agreement
2009/9/2
We propose an new one-round implicitly authenticated three-party protocol that ex-
tends Joux's protocol as well as a two-party identity-based protocol. Our protocols have a single
communication rou...
A Note on Ideal Tripartite Access Structures.
ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings
Key agreement Bilinear pairings Identity-based cryptography
2009/4/15
With various applications of Weil pairing (Tate pairing) to
cryptography, ID-based encryption schemes, digital signature schemes,
blind signature scheme, two-party authenticated key agreement scheme...
Tripartite Authenticated Key Agreement Protocols from Pairings
Secure protocols key agreement authentication
2009/4/13
Joux's protocol [29] is a one round, tripartite key agreement protocol that is more bandwidth-
efficient than any previous three-party key agreement protocol. But it is insecure, suffering from a sim...
This paper proposes a new identity based tripartite key agreement protocol which is more
efficient than the existing ID-based tripartite protocol. This protocol is based on the Joux's protocol for ke...
Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols
Tripartite key agreement protocol man-in-the-middle attack implicit key authentication
2009/4/9
In this paper, we show that the Nalla-Reddy’s one round IDbased
tripartite authenticated key agreement protocols are still insecure
against the man-in-the-middle attacks. We also break the Nalla’s I...
Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols
Passive attack Tripartite key agreement Bilinear pairings
2009/4/9
In this paper we propose security analysis on passive attack for
Nalla-Reddy's ID-AK-2 and ID-AK-3 protocols.
ID-based tripartite Authenticated Key Agreement Protocols from pairings
Key Agreement tripartite, elliptic curves Weil pairing
2009/4/7
This paper proposes ID-based tripartite authenticated key agreement protocols. The
authenticated three party key agreement protocols from pairings [15], and the ID-based two party authenticated key a...
Pairing-Based One-Round Tripartite Key Agreement Protocols
Pairing-Based One-Round Tripartite Key Agreement Protocols
2009/3/25
Since Joux published the first pairing-based one-round tripartite key agreement pro-
tocol [13], many authenticated protocols have been proposed. However most of them were soon
broken or demonstrate...
Weakness of Shim’s New ID-based Tripartite Multiple-key Agreement Protocol
ID-based Weil-paring impersonation attack
2009/3/19
In this article we show that Shim’s new ID-based tripartite multiple-key agreement protocol still suffers from the impersonation attack, a malicious user can launch an impersonation attack on their pr...
Comments: Insider attack on Cheng et al.’s pairing-based tripartite key agreement protocols
attack tripartite key agreement protocols ID-based scheme
2009/1/13
Recently, Cheng et al. proposed two tripartite key agreement protocols from
pairings: one is certificate-based and the other is identity-based (ID-based). In this
article, we show that the two schem...
An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol
One-round Tripartite Authenticated Key Agreement Protocol
2008/9/3
A tripartite authenticated key agreement protocol is generally
designed to accommodate the need of three specific entities in communicating
over an open network with a shared secret key, which is us...
Provable password-based tripartite key agreement protocol
Password Tripartite key agreement Authentication Pairing
2008/8/28
A password-based tripartite key agreement protocol is presented in this paper. The three entities involved in this protocol can negotiate a common session key via a shared password over insecure netwo...