Sciweavers

81 search results - page 2 / 17
» An Authentication Scheme Based on the Twisted Conjugacy Prob...
Sort
View
APNOMS
2009
Springer
13 years 12 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong
ASIACRYPT
2001
Springer
13 years 9 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois
ICCSA
2004
Springer
13 years 10 months ago
Security of Shen et al.'s Timestamp-Based Password Authentication Scheme
Abstract. Recently, Shen et al. proposed an improvement on YangShieh’s timestamp-based password authentication scheme using smart cards. Then they claimed that their scheme canno...
Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
JOC
2006
116views more  JOC 2006»
13 years 5 months ago
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
Abstract. In response to the current need for fast, secure and cheap public-key cryptography, we propose an interactive zero-knowledge identification scheme and a derived signature...
Marc Girault, Guillaume Poupard, Jacques Stern
CCS
2009
ACM
14 years 5 months ago
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
In this paper, we present a new ID-based two-party authenticated key exchange (AKE) protocol, which makes use of a new technique called twin Diffie-Hellman problem proposed by Cas...
Hai Huang, Zhenfu Cao