Authentication and authenticated key exchanges

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication and Authenticated Key Exchanges

We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure p...

متن کامل

Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging

A deniable authenticated key exchange (DAKE) protocol establishes a secure channel without producing cryptographic evidence of communication. A DAKE offers strong deniability if transcripts provide no evidence even if long-term key material is compromised (offline deniability) and no outsider can obtain evidence even when interactively colluding with an insider (online deniability). Unfortunate...

متن کامل

Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

This paper provides the first analytical and practical treatment of entity authentication and authenticated key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been discussed as an alternative concept for secure symmetric key exchange. Several attacks have been proposed on the non-authenticated principle. Adding and some extra entity authentication method i...

متن کامل

Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques

This paper investigates security proofs for protocols that employ asymmetric (public-key) techniques to solve two problems: entity authentication and authenticated key transport. A formal model is provided, and a deenition of the goals within this model is supplied. Two protocols are presented and proven secure within this framework, given the existence of certain cryptographic primitives. The ...

متن کامل

Keyless Authentication and Authenticated Capacity

We consider the problem of keyless message authentication over noisy channels in the presence of an active adversary. Different from the existing models, in our model, the legitimate users do not have any pre-shared key for authentication. Instead, we use the noisy channel connecting the legitimate users for authentication. The main idea is to utilize the noisy channel connecting the legitimate...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Designs, Codes and Cryptography

سال: 1992

ISSN: 0925-1022,1573-7586

DOI: 10.1007/bf00124891