Authentication and authenticated key exchanges
نویسندگان
چکیده
منابع مشابه
Authentication and Authenticated Key Exchanges
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure p...
متن کاملImproved Strongly Deniable Authenticated Key Exchanges for Secure Messaging
A deniable authenticated key exchange (DAKE) protocol establishes a secure channel without producing cryptographic evidence of communication. A DAKE offers strong deniability if transcripts provide no evidence even if long-term key material is compromised (offline deniability) and no outsider can obtain evidence even when interactively colluding with an insider (online deniability). Unfortunate...
متن کاملEntity Authentication and Authenticated Key Exchange with Tree Parity Machines
This paper provides the first analytical and practical treatment of entity authentication and authenticated key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been discussed as an alternative concept for secure symmetric key exchange. Several attacks have been proposed on the non-authenticated principle. Adding and some extra entity authentication method i...
متن کاملEntity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques
This paper investigates security proofs for protocols that employ asymmetric (public-key) techniques to solve two problems: entity authentication and authenticated key transport. A formal model is provided, and a deenition of the goals within this model is supplied. Two protocols are presented and proven secure within this framework, given the existence of certain cryptographic primitives. The ...
متن کاملKeyless Authentication and Authenticated Capacity
We consider the problem of keyless message authentication over noisy channels in the presence of an active adversary. Different from the existing models, in our model, the legitimate users do not have any pre-shared key for authentication. Instead, we use the noisy channel connecting the legitimate users for authentication. The main idea is to utilize the noisy channel connecting the legitimate...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Designs, Codes and Cryptography
سال: 1992
ISSN: 0925-1022,1573-7586
DOI: 10.1007/bf00124891