Sciweavers

139 search results - page 1 / 28
» A Secure and Efficient Authenticated Diffie-Hellman Protocol
Sort
View
EUROPKI
2009
Springer
13 years 2 months ago
A Secure and Efficient Authenticated Diffie-Hellman Protocol
The Exponential Challenge Response (XRC) and Dual Exponential Challenge Response (DCR) signature schemes are the building blocks of the HMQV protocol. We propose a complementary an...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...
EUROCRYPT
2000
Springer
13 years 8 months ago
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Abstract. When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow ...
Victor Boyko, Philip D. MacKenzie, Sarvar Patel
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
13 years 8 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
CORR
2012
Springer
162views Education» more  CORR 2012»
12 years 17 days ago
Improving Security Levels of IEEE 802.16e Authentication By Diffie-Hellman Method
In this paper, we proposed an authentication method according to Diffie-Hellman. First, we introduce different methods for authentication in IEEE.802.16 then we proposed an authen...
Mohammad Zabihi, Ramin Shaghaghi, Mohammad Esmail ...
CCS
2009
ACM
14 years 5 months ago
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
In this paper, we present a new ID-based two-party authenticated key exchange (AKE) protocol, which makes use of a new technique called twin Diffie-Hellman problem proposed by Cas...
Hai Huang, Zhenfu Cao