Two-Party Authenticated Key Agreement Protocol in Cloud Computing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Simulatable certificateless two-party authenticated key agreement protocol

Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public key infrastructure (PKI) or identity-based cryptography. However, the former suffers from a heavy certificate management burden while the latter is subject to the s...

متن کامل

An efficient certificateless two-party authenticated key agreement protocol

Due to avoiding the key escrow problem in the identity-based cryptosystem, certificateless public key cryptosystem (CLPKC) has received a significant attention. As an important part of the CLPKC, the certificateless authenticated key agreement (CLAKA) protocol also received considerable attention. Most CLAKA protocols are built from bilinear mappings on elliptic curves which need costly operati...

متن کامل

Pairing-Based Two-Party Authenticated Key Agreement Protocol

To achieve secure data communications, two parties should be authenticated by each other and agree on a secret session key by exchanging messages over an insecure channel. In this paper, based on the bilinear pairing, we present a new two-party authenticated key agreement protocol, and use the techniques from provable security to examine the security of our protocol within Bellare-Rogaway model.

متن کامل

Cryptanalysis of Two-party Explicit Authenticated Key Agreement Protocol

In 2015, Zheng et al. proposed an efficient protocol for two-party explicit authenticated key agreement(2EAKA). Zheng et al. claimed that their proposed 2EAKA protocol does not need any fixed public key infrastructure and is provably secure in the random oracle under the Computation Gap Diffie-Hellman assumption. However, this paper points out that Zheng et al.’s 2EAKA protocol still suffers fr...

متن کامل

Certificateless Authenticated Two-Party Key Agreement Protocols

Certificateless public key cryptography (CL-PKC) was proposed to overcome the weaknesses of the public key infrastructure (PKI) and identity-based cryptography (ID-PKC). In PKI, certificates are used to provide the authenticity of public keys. However, a PKI faces many challenges in practice, such as the scalability of the infrastructure and certificate management (distribution, revocation, sto...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Research in Science, Communication and Technology

سال: 2021

ISSN: 2581-9429

DOI: 10.48175/ijarsct-1201