Three party key sharing protocol using polynomial rings

A Chaturvedi, V Shukla… - 2018 5th IEEE Uttar …, 2018 - ieeexplore.ieee.org
All of us know that authentication and key agreement are the two cryptographic services very
important for data communication. People use online methods for information exchange …

Efficient and anonymous authentication with succinct multi-subscription credential in SAGVN

D Liu, H Wu, J Ni, X Shen - IEEE Transactions on Intelligent …, 2022 - ieeexplore.ieee.org
In this paper, we propose an efficient and anonymous authentication protocol with a succinct
multi-subscription credential (AnMsc) in Space-air-ground integrated vehicular networks …

A secure authenticated key agreement protocol using polynomials

MK Mishra, V Shukla, A Chaturvedi… - … Conference on Recent …, 2023 - Springer
Data communication is now an inseparable part of our day-to-day life. There are various
aspects of data security, and authentication and key agreement are dominating among them …

The opening capability for security against privacy infringements in the smart grid environment

S Eom, JH Huh - Mathematics, 2018 - mdpi.com
It is now known that more information can be leaked into the smart grid environment than
into the existing environment. In particular, specific information such as energy consumption …

Anonymity-based authenticated key agreement with full binding property

JY Hwang, S Eom, KY Chang, PJ Lee… - Journal of …, 2016 - ieeexplore.ieee.org
In this paper, we consider some aspects of binding properties that bind an anonymous user
with messages. According to whether all the messages or some part of the messages are …

Anonymous signature with signer-controlled opening capability

S Eom, JH Huh - Advances in Computer Science and Ubiquitous …, 2018 - Springer
Anonymous signature is a method that provides validities of signature while signers are not
exposed. Group signature is a method in anonymous signatures that the verifiers can assure …

Simple and provably secure anonymous authenticated key exchange with a binding property

K Son, DG Han, D Won - IEICE Transactions on Communications, 2015 - search.ieice.org
In this work we propose a two-party anonymous authenticated key exchange protocol that
provides a communication binding property. The proposed protocol makes use of a compact …

Group Signature with Signer-Controlled Opening Capability: Separate Token Generator

S Eom, JH Huh - Advances in Computer Science and Ubiquitous …, 2018 - Springer
One of the most important cytological authorization methods to protect privacy is group
signature method. Verifiers have limited information of the signers that gives the limited …

[PDF][PDF] SC27/WG2 에서의디지털서명과실체인증표준소개

PJ Lee - Review of KIISC, 2015 - koreascience.kr
Abstract ISO/IEC JTC1/SC27/WG2 (Information technology-Security techniques-
Cryptography & Security Mechanisms, 이하 줄여서'SC27/WG2'로 표시) 은 암호학을 중심으로 …