Authenticated secret key generation in delay-constrained wireless systems
نویسندگان
چکیده
منابع مشابه
Secret Key Generation for Fading Wireless Channel
The multipath-rich wireless atmosphere allied with typical wireless usage scenarios is characterized by a vanishing channel retort that is time-varying, location-sensitive, and only shared by a given transmitter–receiver pair. The complexity allied with a highly scattering atmosphere implies that the short-term vanishing process is intrinsically hard to envisage and best modeled stochastically,...
متن کاملBeyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
Public key based authentication and key exchange protocols are not usually designed with privacy in mind and thus involve cleartext exchanges of identities and certificates before actual authentication. In contrast, an AffiliationHiding Authentication Protocol, also called a Secret Handshake, allows two parties with certificates issued by the same organization to authenticate each other in a pr...
متن کاملGroup Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement
Privacy concerns in many aspects of electronic communication trigger the need to re-examine – with privacy in mind – familiar security services, such as authentication and key agreement. An Affiliation-Hiding Group Key Agreement (AH-AGKA) protocol (also known as Group Secret Handshake) allows a set of participants, each with a certificate issued by the same authority, to establish a common auth...
متن کاملwind farm impact on generation adequacy in power systems
در سال های اخیر به دلیل افزایش دمای متوسط کره زمین، بشر به دنبال روش های جایگزین برای تامین توان الکتریکی مورد نیاز خود بوده و همچنین در اکثر نقاط جهان سوزاندن سوخت های فسیلی در نیروگاه های حرارتی به عنوان مهم ترین روش تولید توان الکتریکی مطرح بوده است. به دلیل توجه به مسایل زیست محیطی، استفاده از منابع انرژی تجدید پذیر در سال های اخیر شدت یافته است. نیروگاه های بادی به عنوان یک منبع تولید توان...
15 صفحه اولPassword Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract)
With the advancement of wireless technology and the increasing demand for resource-constrained mobile devices, secure and efficient password authenticated key exchange (PAKE) protocols are needed for various kinds of secure communications among low-power wireless devices. In this paper, we introduce an elliptic curve based password-keyed permutation family and use it to construct a PAKE in such...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EURASIP Journal on Wireless Communications and Networking
سال: 2020
ISSN: 1687-1499
DOI: 10.1186/s13638-020-01742-0