The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the authentication problem. In this paper we propose...
Harn and Lin proposed an authenticated key agreement without using one-way hash functions. It enables two communicating parties to establish four common session keys by sending two Diffie-Hellman public keys in a single round of message exchange. However, to resist the known key attack, only three common session keys can be used. Over the past years, all researches study to establish four common session...
This paper first analyzes authentication and key agreement protocol adopted by 3rd generation partnership project (3GPP) system architecture evolution (SAE) release 8 standard, and points out the security problems solved and not solved in contrast with third generation wireless communications. Then we focus on several security defects in the protocol, and based on public key cryptosystem, puts forward...
Some new notions and approaches are introduced to SVO logic, which make it capable of analyzing some authenticated key agreement protocols. A typical wireless authentication and key agreement protocol based on elliptic curve cryptography is analyzed by formal analysis methods. Some flaws have been found, which means that the protocol can not achieve the essential security requirements of security...
A crucial aspect when establishing a secure peer-to-peer communication channel is the negotiation of the security parameters used to protect the successive data communications, including the various encryption and authentication keys. There are different secure protocol (such as IPSec, TLS, SSH, etc.) currently defined with their own negotiation mechanisms; unfortunately they usually rely on a pre-established...
A key agreement protocol is designed for two or more entities to agree upon a shared secret key, which can subsequently be used to preserve confidentiality and data integrity over an open network. Since Joux has pioneered the notion of pairing-based tripartite key agreement protocol, various group key agreement schemes have been proposed after then. In 2003, Liu et al. proposed a tripartite identity-based...
A deniable authentication protocol enables the protocol participants to authenticate their respective peers, while able to deny their participation after the protocol execution. This protocol can be extremely useful in some practical applications such as online negotiation and electronic voting. In 2007, Ma et al. proposed a chameleon-based deniable authenticated key agreement protocol while in 2006,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.