Two-Party Authenticated Key Agreement Protocol in Cloud Computing
نویسندگان
چکیده
منابع مشابه
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public key infrastructure (PKI) or identity-based cryptography. However, the former suffers from a heavy certificate management burden while the latter is subject to the s...
متن کاملAn efficient certificateless two-party authenticated key agreement protocol
Due to avoiding the key escrow problem in the identity-based cryptosystem, certificateless public key cryptosystem (CLPKC) has received a significant attention. As an important part of the CLPKC, the certificateless authenticated key agreement (CLAKA) protocol also received considerable attention. Most CLAKA protocols are built from bilinear mappings on elliptic curves which need costly operati...
متن کاملPairing-Based Two-Party Authenticated Key Agreement Protocol
To achieve secure data communications, two parties should be authenticated by each other and agree on a secret session key by exchanging messages over an insecure channel. In this paper, based on the bilinear pairing, we present a new two-party authenticated key agreement protocol, and use the techniques from provable security to examine the security of our protocol within Bellare-Rogaway model.
متن کاملCryptanalysis of Two-party Explicit Authenticated Key Agreement Protocol
In 2015, Zheng et al. proposed an efficient protocol for two-party explicit authenticated key agreement(2EAKA). Zheng et al. claimed that their proposed 2EAKA protocol does not need any fixed public key infrastructure and is provably secure in the random oracle under the Computation Gap Diffie-Hellman assumption. However, this paper points out that Zheng et al.’s 2EAKA protocol still suffers fr...
متن کاملCertificateless Authenticated Two-Party Key Agreement Protocols
Certificateless public key cryptography (CL-PKC) was proposed to overcome the weaknesses of the public key infrastructure (PKI) and identity-based cryptography (ID-PKC). In PKI, certificates are used to provide the authenticity of public keys. However, a PKI faces many challenges in practice, such as the scalability of the infrastructure and certificate management (distribution, revocation, sto...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Research in Science, Communication and Technology
سال: 2021
ISSN: 2581-9429
DOI: 10.48175/ijarsct-1201