Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem

Z Mohammad, AAA Alkhatib, M Lafi… - 2021 International …, 2021 - ieeexplore.ieee.org
Authenticated key exchange protocols are a fundamental cryptography building block for
establishing a secret shared key among participating parties over an open network model …

Provably secure authenticated key exchange protocol under the CDH assumption

J Zhao, D Gu - Journal of Systems and Software, 2010 - Elsevier
Constructing a secure key exchange protocol is one of the most challenging problems in
information security. We propose a provably secure two-round two-party authenticated key …

Tightly‐secure two‐pass authenticated key exchange protocol using twin Diffie–Hellman problem

R Zeng, L Wang - IET Information Security, 2020 - Wiley Online Library
Tight security is an important requirement of practical cryptographic schemes. Compared
with loosely‐secure schemes, tightly‐secure schemes allow shorter security parameters …

Strongly secure one round authenticated key exchange protocol with perfect forward security

H Huang - … Security: 5th International Conference, ProvSec 2011 …, 2011 - Springer
So far, there exist no two-pass authenticated key exchange protocols which are provably
secure in the eCK model and meanwhile achieve perfect forward security against active …

An efficient strongly secure authenticated key exchange protocol without random oracles

Z Yang - Security and Communication Networks, 2015 - Wiley Online Library
Since the introduction of extended Canetti–Krawczyk (eCK) security model for two‐party key
exchange, many protocols have been proposed to provide eCK security. However, most of …

[图书][B] Authenticated Key Exchange Protocols with Unbalanced Computational Requirements

J Zhang - 2018 - search.proquest.com
Security is a significant problem for communications in many scenarios in Internet of Things
(IoT), such as military applications, electronic payment, wireless reprogramming of smart …

eCK-security authenticated key agreement protocol based on CDH assumption

M Liu, Y Zhao, S Chen - 2016 2nd IEEE International …, 2016 - ieeexplore.ieee.org
By far, the extended Canetti-Krawczyk (eCK) model still is one of strongest security model for
authenticated key exchange (AKE) protocols. In this paper, a secure authenticated key …

Provably secure two-party authenticated key exchange protocol in eCK model

JJ Zhao, DW Gu - Jisuanji Xuebao(Chinese Journal of Computers), 2011 - cjc.ict.ac.cn
How to construct secure key agreement protocol is one of the most challenging problems in
information security area. However, most of the current secure protocols can only achieve …

[PDF][PDF] An eCK-Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security.

H Huang - J. Internet Serv. Inf. Secur., 2011 - isyou.info
This paper investigates the two-pass (one round) authenticated key exchange protocol in
the enhanced Canetti-Krawczyk (eCK) model with perfect forward security against active …

A New Lightweight Two-Party Key Agreement Protocol Defined on Underdetermined Systems of Polynomial Equations for Probable Security

J Liu - MILCOM 2018-2018 IEEE Military Communications …, 2018 - ieeexplore.ieee.org
This paper introduces a new lightweight key exchange (KE) protocol which can be suitably
implemented on resource-constrained smart devices to protect the privacy of …