Yahyapoor et al., 2014 - Google Patents
Presentation of a two-party key agreement protocol based on chaosYahyapoor et al., 2014
View PDF- Document ID
- 15936872808289035522
- Author
- Yahyapoor N
- Shaerbaf S
- Nikooghadam M
- Publication year
- Publication venue
- SIJ Trans. Comput. Sci. Eng. Appl.
External Links
Snippet
One of the most important cryptography protocols is the key agreement protocol in which used to build a shared secret key between two participants through an insecure channel. To increase the security and efficiency of these protocols, many researches have been …
- 230000000739 chaotic 0 abstract description 24
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1134929B1 (en) | Secure mutual network authentication and key exchange protocol | |
| Zhang et al. | Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card | |
| US9698985B2 (en) | Authentication | |
| Tan | An efficient biometrics-based authentication scheme for telecare medicine information systems | |
| US8971540B2 (en) | Authentication | |
| Farash et al. | Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing | |
| US20150124963A1 (en) | Authentication | |
| Ibrahem | Modification of Diffie-Hellman key exchange algorithm for Zero knowledge proof | |
| Giri et al. | Efficient biometric and password based mutual authentication for consumer USB mass storage devices | |
| Islam et al. | An anonymous and provably secure authentication scheme for mobile user | |
| Amin et al. | Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card | |
| Tsai et al. | A chaotic map‐based anonymous multi‐server authenticated key agreement protocol using smart card | |
| Song et al. | Hardening password-based credential databases | |
| Li et al. | A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service | |
| Zhu et al. | A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem. | |
| Amin et al. | An improvement of wang. et. al.'s remote user authentication scheme against smart card security breach | |
| Luo et al. | An efficient chaos‐based 2‐party key agreement protocol with provable security | |
| Hsu et al. | Password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map | |
| Yahyapoor et al. | Presentation of a two-party key agreement protocol based on chaos | |
| Roy et al. | A biometrics-based robust and secure user authentication protocol for e-healthcare service | |
| Srivastava et al. | A review on remote user authentication schemes using smart cards | |
| Sudhakar et al. | Secured mutual authentication between two entities | |
| Zhen et al. | Key agreement protocol based on extended chaotic maps with anonymous authentication | |
| Lin et al. | Authenticated Key Agreement Scheme with Privacy-Protection in the Three-party Setting. | |
| Kumari et al. | Security problems of a “more secure remote user authentication scheme” |