Authenticated Key Agreement mediated by a Proxy Re-encryptor for the Internet of ThingsAuthenticated Key Agreement • July 4th, 2016
Contract Type FiledJuly 4th, 2016Abstract. The Internet of Things (IoT) is composed of a wide range of heterogeneous network devices that communicate with their users and the surrounding devices. The secure communications between these de- vices are still essential even with little or no previous knowledge about each other and regardless of their resource capabilities. This particular context requires appropriate security mechanisms which should be well- suited for the heterogeneous nature of IoT devices, without pre-sharing a secret key for each secure connection.
Password Authenticated Key Agreement for Contactless Smart CardsAuthenticated Key Agreement • July 16th, 2008
Contract Type FiledJuly 16th, 2008
Authenticated Key Agreement Based on NFC for Mobile PaymentAuthenticated Key Agreement • November 12th, 2020
Contract Type FiledNovember 12th, 2020
Password Authenticated Key Agreement for Contactless Smart CardsAuthenticated Key Agreement • July 17th, 2008
Contract Type FiledJuly 17th, 2008– If a fresh point P is calculated in every protocol run, it is guaranteed that the discrete logarithm of Gj is unknown to both parties. If at least one party chooses its secret value (i.e. x1 or x2, respectively) randomly and uniformly, P and thus Gj are distributed randomly and uniformly in < G >∗.
Authenticated Key Agreement with Key Re-Use in the Short Authenticated Strings ModelAuthenticated Key Agreement • April 12th, 2012
Contract Type FiledApril 12th, 2012
Authenticated Key Agreement Protocol for HWSN NetworkAuthenticated Key Agreement • February 26th, 2021
Contract Type FiledFebruary 26th, 2021
Authenticated key agreementAuthenticated Key Agreement • January 10th, 2021
Contract Type FiledJanuary 10th, 2021) This attack cannot be detected unless A and B have some long-term keys that are known to each other or compare their keys out of band.
Authenticated Key Agreement Scheme with Privacy-Protection in the Three-party SettingAuthenticated Key Agreement • April 9th, 2024
Contract Type FiledApril 9th, 2024Going along with the rapid development of web technolo- gies, in some applications on demands, partners or staffs may make a great quantity of web transactions or per- sonal communications anytime and anywhere. However, the partners could be distributed over different network domains. They require a communal trusted third party to help them establish a shared session key for future com- munications. In addition, from the privacy or security point of view, the partners hope that their transactions patterns or movements are not recorded from any external eavesdropper. However, this privacy issue has never been addressed in previous literature. In this paper, we first propose a three-party key agreement scheme to construct a secure transaction mechanism with privacy protection. In our scheme, the major merits include: (1) prevention of some known attacks; (2) satisfaction of the perfect for- ward secrecy; (3) security against the session state reveal;
Password Authenticated Key Agreement for Contactless Smart CardsAuthenticated Key Agreement • May 9th, 2008
Contract Type FiledMay 9th, 2008Abstract. This paper describes and compares the usage of password- based authenticated key agreement protocols to establish a secure com- munication channel between terminal and contactless card. In particu- lar, protocols of this kind are discussed for use in contactless ID cards. The aim of this paper is to discuss, for the first time, two cryptographic password-based protocols with respect to security, implementation efforts and performance. Furthermore, a real life implementation on NXP’s high security SmartMX chip is presented.
Authenticated Key Agreement Scheme with Privacy-Protection in the Three-party SettingAuthenticated Key Agreement • September 20th, 2012
Contract Type FiledSeptember 20th, 2012
Certificateless Authenticated Two-Party Key Agreement ProtocolsAuthenticated Key Agreement • April 6th, 2006
Contract Type FiledApril 6th, 2006– If A’s private key is compromised, an adversary can impersonate A, but the adversary should not be able to impersonate other entities, say B, to A.
Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical SystemsAuthenticated Key Agreement • December 12th, 2022
Contract Type FiledDecember 12th, 2022With the tremendous growth of Information and Communications Technology (ICT), Cyber Physical Systems (CPS) have opened the door for many potential applications ranging from smart grids and smart cities to transportation, retail, public safety and networking, healthcare and industrial manufacturing. However, due to communication via public channel occurring among various entities in an industrial CPS (ICPS) with the help of the 5G technology and Software-Defined Networking (SDN), it poses several potential security threats and attacks. To mitigate these issues, we propose a new three-factor user
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings ModelAuthenticated Key Agreement • July 15th, 2010
Contract Type FiledJuly 15th, 2010
Authenticated Key Agreement Scheme with Privacy-Protection in the Three-party SettingAuthenticated Key Agreement • July 13th, 2013
Contract Type FiledJuly 13th, 2013