Sciweavers

172 search results - page 6 / 35
» Key agreement from weak bit agreement
Sort
View
CJ
2007
85views more  CJ 2007»
14 years 9 months ago
On The Security of a Group Key Agreement Protocol
In this paper we show that the group key agreement protocol proposed by Tseng suffers from a number of serious security vulnerabilities.
Qiang Tang
AMC
2005
172views more  AMC 2005»
14 years 9 months ago
An efficient nonce-based authentication scheme with key agreement
In this paper, we propose a cost effective mutual authentication scheme with key agreement using smart cards. Our scheme is motivated by the scheme design in two articles publishe...
Yen-Cheng Chen, Lo-Yao Yeh
SP
2003
IEEE
136views Security Privacy» more  SP 2003»
15 years 2 months ago
Secret Handshakes from Pairing-Based Key Agreements
Consider a CIA agent who wants to authenticate herself to a server, but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that t...
Dirk Balfanz, Glenn Durfee, Narendar Shankar, Dian...
60
Voted
CRYPTO
2006
Springer
73views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam...
ICICS
2005
Springer
15 years 3 months ago
Security Properties of Two Authenticated Conference Key Agreement Protocols
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed ...
Qiang Tang, Chris J. Mitchell