• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 999,244
Next 10 →

On Key Agreement and Conference Key Agreement

by Colin Boyd - Information Security and Privacy: Australasian Conference, LNCS(1270):294–302 , 1997
"... An attack is demonstrated on a previously proposed class of key agreement protocols. Analysis of the attack reveals that a small change in the construction of the protocols is sufficient to prevent the attack. The insight gained allows a generalisation of the class to a new design for conference key ..."
Abstract - Cited by 35 (1 self) - Add to MetaCart
An attack is demonstrated on a previously proposed class of key agreement protocols. Analysis of the attack reveals that a small change in the construction of the protocols is sufficient to prevent the attack. The insight gained allows a generalisation of the class to a new design for conference

Key Agreement in Dynamic Peer Groups

by Michael Steiner, Gene Tsudik, Michael Waidner - IEEE Transactions on Parallel and Distributed Systems , 2000
"... As a result of the increased popularity of grouporiented applications and protocols, group communication occurs in many different settings: from network multicasting to application layer tele- and video-conferencing. Regardless of the application environment, security services are necessary to provi ..."
Abstract - Cited by 212 (18 self) - Add to MetaCart
to provide communication privacy and integrity. This paper considers the problem of key agreementindynamic peer groups. (Key agreement, especially in a group setting, is the steeping stone for all other security services.) Dynamic peer groups require not only initial key agreement (IKA) but also auxiliary

Key Agreement Protocols and their Security Analysis

by Simon Blake-Wilson , Don Johnson, Alfred Menezes , 1997
"... This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key confirmation in the asymmetric (public-key) setting. A formal ..."
Abstract - Cited by 164 (6 self) - Add to MetaCart
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key confirmation in the asymmetric (public-key) setting. A formal

Secret Key Agreement by Public Discussion From Common Information

by Ueli M. Maurer - IEEE Transactions on Information Theory , 1993
"... . The problem of generating a shared secret key S by two parties knowing dependent random variables X and Y , respectively, but not sharing a secret key initially, is considered. An enemy who knows the random variable Z, jointly distributed with X and Y according to some probability distribution PX ..."
Abstract - Cited by 440 (18 self) - Add to MetaCart
) are derived for the case where X = [X 1 ; : : : ; XN ], Y = [Y 1 ; : : : ; YN ] and Z = [Z 1 ; : : : ; ZN ] result from N independent executions of a random experiment generating X i ; Y i and Z i , for i = 1; : : : ; N . In particular it is shown that such secret key agreement is possible for a scenario

On Key Agreement and

by Colin Boyd, Juan Manuel, González Nieto - Conference Key Agreement. ACISP ’97
"... This is the author’s version of a work that was submitted/accepted for publication in the following source: ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
This is the author’s version of a work that was submitted/accepted for publication in the following source:

An Efficient Protocol for Authenticated Key Agreement

by Laurie Law, Alfred Menezes, Minghua Qu, Jerry Solinas, Scott Vanstone - Designs, Codes and Cryptography , 1998
"... This paper proposes a new and efficient two-pass protocol for authenticated key agreement in the asymmetric (public-key) setting. The protocol is based on Diffie-Hellman key agreement and can be modified to work in an arbitrary finite group and, in particular, elliptic curve groups. Two modification ..."
Abstract - Cited by 157 (4 self) - Add to MetaCart
This paper proposes a new and efficient two-pass protocol for authenticated key agreement in the asymmetric (public-key) setting. The protocol is based on Diffie-Hellman key agreement and can be modified to work in an arbitrary finite group and, in particular, elliptic curve groups. Two

Key Agreement in Ad-hoc Networks

by N. Asokan, Philip Ginzboorg - Computer Communications , 1999
"... We encounter new types of security problems in ad-hoc networks because such networks have little or no support infrastructure. In this paper we consider one such problem: A group of people in a meeting room do not have access to public key infrastructure or third party key management service, and th ..."
Abstract - Cited by 123 (0 self) - Add to MetaCart
, and they do not share any other prior electronic context. How can they set up a secure session among their computers? We examine various alternatives and propose new protocols for password-based multi-party key agreement in this scenario. Our protocols may be applicable in other scenarios, too. We also

Tree-based group key agreement

by Yongdae Kim, Adrian Perrig, Gene Tsudik - ACM Transactions on Information and System Security , 2004
"... Abstract. Secure and reliable group communication is an active area of research. Its popularity is caused by the growing importance of group-oriented and collaborative applications. The central research challenge is secure and efficient group key management. While centralized methods are often appro ..."
Abstract - Cited by 108 (5 self) - Add to MetaCart
appropriate for key distribution in large multicast-style groups, many collaborative group settings require distributed key agreement techniques. This work investigates a novel group key agreement approach which blends so-called key trees with Diffie-Hellman key exchange. It yields a secure protocol suite

An efficient and secure key agreement

by Chang-hyi Lee, Jong-in Lim, Jeong-soo Kim - IEEE p1363a , 1998
"... Abstract. In this paper we propose a new and efficient protocol for authenticated key agreement based on Diffie-Hellman key agreement, which works in an arbitrary finite group. Our AK(Key Agreement)protocol saves some of computational cost, since it requires only two dominant computation factors(e.g ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Abstract. In this paper we propose a new and efficient protocol for authenticated key agreement based on Diffie-Hellman key agreement, which works in an arbitrary finite group. Our AK(Key Agreement)protocol saves some of computational cost, since it requires only two dominant computation factors

Robust Key Agreement Schemes

by Terence Chan, Ning Cai, Alex Grant , 901
"... Abstract — This paper considers a key agreement problem in which two parties aim to agree on a key by exchanging messages in the presence of adversarial tampering. The aim of the adversary is to disrupt the key agreement process, but there are no secrecy constraints (i.e. we do not insist that the k ..."
Abstract - Add to MetaCart
Abstract — This paper considers a key agreement problem in which two parties aim to agree on a key by exchanging messages in the presence of adversarial tampering. The aim of the adversary is to disrupt the key agreement process, but there are no secrecy constraints (i.e. we do not insist
Next 10 →
Results 1 - 10 of 999,244
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University