Results 1 - 10
of
999,244
On Key Agreement and Conference Key Agreement
- Information Security and Privacy: Australasian Conference, LNCS(1270):294–302
, 1997
"... An attack is demonstrated on a previously proposed class of key agreement protocols. Analysis of the attack reveals that a small change in the construction of the protocols is sufficient to prevent the attack. The insight gained allows a generalisation of the class to a new design for conference key ..."
Abstract
-
Cited by 35 (1 self)
- Add to MetaCart
An attack is demonstrated on a previously proposed class of key agreement protocols. Analysis of the attack reveals that a small change in the construction of the protocols is sufficient to prevent the attack. The insight gained allows a generalisation of the class to a new design for conference
Key Agreement in Dynamic Peer Groups
- IEEE Transactions on Parallel and Distributed Systems
, 2000
"... As a result of the increased popularity of grouporiented applications and protocols, group communication occurs in many different settings: from network multicasting to application layer tele- and video-conferencing. Regardless of the application environment, security services are necessary to provi ..."
Abstract
-
Cited by 212 (18 self)
- Add to MetaCart
to provide communication privacy and integrity. This paper considers the problem of key agreementindynamic peer groups. (Key agreement, especially in a group setting, is the steeping stone for all other security services.) Dynamic peer groups require not only initial key agreement (IKA) but also auxiliary
Key Agreement Protocols and their Security Analysis
, 1997
"... This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key confirmation in the asymmetric (public-key) setting. A formal ..."
Abstract
-
Cited by 164 (6 self)
- Add to MetaCart
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key confirmation in the asymmetric (public-key) setting. A formal
Secret Key Agreement by Public Discussion From Common Information
- IEEE Transactions on Information Theory
, 1993
"... . The problem of generating a shared secret key S by two parties knowing dependent random variables X and Y , respectively, but not sharing a secret key initially, is considered. An enemy who knows the random variable Z, jointly distributed with X and Y according to some probability distribution PX ..."
Abstract
-
Cited by 440 (18 self)
- Add to MetaCart
) are derived for the case where X = [X 1 ; : : : ; XN ], Y = [Y 1 ; : : : ; YN ] and Z = [Z 1 ; : : : ; ZN ] result from N independent executions of a random experiment generating X i ; Y i and Z i , for i = 1; : : : ; N . In particular it is shown that such secret key agreement is possible for a scenario
On Key Agreement and
- Conference Key Agreement. ACISP ’97
"... This is the author’s version of a work that was submitted/accepted for publication in the following source: ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
This is the author’s version of a work that was submitted/accepted for publication in the following source:
An Efficient Protocol for Authenticated Key Agreement
- Designs, Codes and Cryptography
, 1998
"... This paper proposes a new and efficient two-pass protocol for authenticated key agreement in the asymmetric (public-key) setting. The protocol is based on Diffie-Hellman key agreement and can be modified to work in an arbitrary finite group and, in particular, elliptic curve groups. Two modification ..."
Abstract
-
Cited by 157 (4 self)
- Add to MetaCart
This paper proposes a new and efficient two-pass protocol for authenticated key agreement in the asymmetric (public-key) setting. The protocol is based on Diffie-Hellman key agreement and can be modified to work in an arbitrary finite group and, in particular, elliptic curve groups. Two
Key Agreement in Ad-hoc Networks
- Computer Communications
, 1999
"... We encounter new types of security problems in ad-hoc networks because such networks have little or no support infrastructure. In this paper we consider one such problem: A group of people in a meeting room do not have access to public key infrastructure or third party key management service, and th ..."
Abstract
-
Cited by 123 (0 self)
- Add to MetaCart
, and they do not share any other prior electronic context. How can they set up a secure session among their computers? We examine various alternatives and propose new protocols for password-based multi-party key agreement in this scenario. Our protocols may be applicable in other scenarios, too. We also
Tree-based group key agreement
- ACM Transactions on Information and System Security
, 2004
"... Abstract. Secure and reliable group communication is an active area of research. Its popularity is caused by the growing importance of group-oriented and collaborative applications. The central research challenge is secure and efficient group key management. While centralized methods are often appro ..."
Abstract
-
Cited by 108 (5 self)
- Add to MetaCart
appropriate for key distribution in large multicast-style groups, many collaborative group settings require distributed key agreement techniques. This work investigates a novel group key agreement approach which blends so-called key trees with Diffie-Hellman key exchange. It yields a secure protocol suite
An efficient and secure key agreement
- IEEE p1363a
, 1998
"... Abstract. In this paper we propose a new and efficient protocol for authenticated key agreement based on Diffie-Hellman key agreement, which works in an arbitrary finite group. Our AK(Key Agreement)protocol saves some of computational cost, since it requires only two dominant computation factors(e.g ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Abstract. In this paper we propose a new and efficient protocol for authenticated key agreement based on Diffie-Hellman key agreement, which works in an arbitrary finite group. Our AK(Key Agreement)protocol saves some of computational cost, since it requires only two dominant computation factors
Robust Key Agreement Schemes
, 901
"... Abstract — This paper considers a key agreement problem in which two parties aim to agree on a key by exchanging messages in the presence of adversarial tampering. The aim of the adversary is to disrupt the key agreement process, but there are no secrecy constraints (i.e. we do not insist that the k ..."
Abstract
- Add to MetaCart
Abstract — This paper considers a key agreement problem in which two parties aim to agree on a key by exchanging messages in the presence of adversarial tampering. The aim of the adversary is to disrupt the key agreement process, but there are no secrecy constraints (i.e. we do not insist
Results 1 - 10
of
999,244