نتایج جستجو برای: deniable authentication

تعداد نتایج: 35051  

2003
Colin Boyd Wenbo Mao Kenneth G. Paterson

We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof...

Journal: :Comput. J. 2011
Lein Harn Chia-Yin Lee Changlu Lin Chin-Chen Chang

1Department of Computer Science Electrical Engineering, University of Missouri-Kansas City, Kansas City, MO 64110, USA 2Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi 62102, Taiwan 3Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fujian 350007, P. R. China 4Department of Information Engineering and Computer Scienc...

2012
Jens Bender Özgür Dagdelen Marc Fischlin Dennis Kügler

We discuss an efficient combination of the cryptographic protocols adopted by the International Civil Aviation Organization (ICAO) for securing the communication of machine readable travel documents and readers. Roughly, in the original protocol the parties first run the Password-Authenticated Connection Establishment (PACE) protocol to establish a shared key and then the reader (optionally) in...

Journal: :J. Network and Computer Applications 2018
Mohamed Amine Ferrag Leandros A. Maglaras Antonios Argyriou Dimitrios Kosmanos Helge Janicke

This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks again...

2002
Jonathan Katz

We describe efficient protocols for non-malleable (interactive) proofs of plaintext knowledge for the RSA, Rabin, Paillier, and El Gamal encryption schemes. We also highlight some important applications of these protocols: – Chosen-ciphertext-secure, interactive encryption. In settings where both parties are on-line, an interactive encryption protocol may be used. We construct chosen-ciphertext...

Journal: :TIIS 2017
Mu Han Lei Hua Shidian Ma

With the rapid development of vehicular ad hoc Network (VANET), it is gaining significant popularity and receiving increasing attentions from academics and industry in security and efficiency. To address security and efficiency issues, a selfauthentication and deniable efficient group key agreement protocol is proposed in this paper. This scheme establishes a group between road-side unit (RSU) ...

2002
Jonathan Katz

We describe very efficient protocols for non-malleable (interactive) proofs of plaintext knowledge for the RSA, Rabin, Paillier, and El-Gamal encryption schemes whose security can be proven in the standard model. We also highlight some important applications of these protocols, where we take care to ensure that our protocols remain secure when run in an asynchronous, concurrent environment: • C...

2014
Maede Ashouri-Talouki Ahmad Baraani-Dastjerdi

This paper analyzes Chun et al.’s e-voting protocol for mobile ad-hoc network and modifies it based on blind signature technique to support anonymous voting property. Based on this property the trusted node cannot learn who has voted for whom. As the previous protocol, the modified protocol does not need any centralized administration. We analyze security and computation cost of the proposed pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید