A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol
نویسندگان
چکیده
منابع مشابه
A Novel Extensible Authentication Protocol Based Group Authentication and Key Agreement Protocol for Wireless Networking
By utilizing the broadcast nature of radio channels, cooperative wireless communications exploits a brand new degree of freedom to combat unfavorable wireless channel conditions with the help of relays. The transmission reliableness and rates achieved by cooperation for various communication eventualities and cooperation schemes are extensively studied. However, additionally to the benefits it ...
متن کاملIdentity Based Authenticated Group Key Agreement Protocol
An important and popular trend in modern computing is to convert traditional centralized services into distributed services spread across multiple systems and networks. One-way function trees can be used to extend two-party Key Agreement protocols to n-party protocols. Tree-based Group Diffie-Hellman [17] is one such protocol. This paper proposes the first Identity based Group Key Agreement pro...
متن کاملQueue-based Group Key Agreement Protocol
Group communication is exploding in Internet applications such as video conferences, online chatting programs, games, and gambling. Since most group communication takes place over the Internet that is a wide open network, security plays a major role. For a secure communication, the integrity of messages, member authentication, and confidentiality must be provided among group members. To maintai...
متن کاملIronwood Meta Key Agreement and Authentication Protocol
Number theoretic public key solutions are subject to various quantum attacks making them less attractive for longer term use. Certain group theoretic constructs show promise in providing quantum-resistant cryptographic primitives. We introduce a new protocol called a Meta Key Agreement and Authentication Protocol (MKAAP) that has some characteristics of a public key solution and some of a share...
متن کاملAn Efficient ECC-based Authentication and Key Agreement Protocol
Public-key cryptography is commonly used to authenticate communicating entities in some networks. One of the key tools in this way is to use the elliptic curves cryptography (ECC) which is relatively lightweight due to its shorter key size compared to the conventional River-Shamir-Adleman (RSA) method. This paper is proposing an efficient protocol by analysing two variants of ECC-based wireless...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2020
ISSN: 1424-8220
DOI: 10.3390/s20174835