Sciweavers

620 search results - page 15 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
ACISP
2008
Springer
15 years 1 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
CTRSA
2008
Springer
137views Cryptology» more  CTRSA 2008»
15 years 1 months ago
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
Public key based authentication and key exchange protocols are not usually designed with privacy in mind and thus involve cleartext exchanges of identities and certificates before ...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
GLOBECOM
2006
IEEE
15 years 5 months ago
A Non-Commutative Generalization of ElGamal Key Exchange using Polycyclic Groups
Abstract— In this paper, we propose a non-commutative keyexchange scheme which generalizes the classical ElGamal Cipher to polycyclic groups. We will explore other classes of gro...
Delaram Kahrobaei, Bilal Khan
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
15 years 10 days ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
FC
2007
Springer
125views Cryptology» more  FC 2007»
15 years 5 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester