PB-3PAKA: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments

2021 ◽  
Vol 63 ◽  
pp. 103026
Author(s):  
SK Hafizul Islam ◽  
Swagatam Basu
2014 ◽  
Vol 36 (10) ◽  
pp. 2156-2167
Author(s):  
Qiang LI ◽  
Deng-Guo FENG ◽  
Li-Wu ZHANG ◽  
Zhi-Gang GAO

2011 ◽  
Vol 54 (11-12) ◽  
pp. 3143-3152 ◽  
Author(s):  
Debiao He ◽  
Yitao Chen ◽  
Jianhua Chen ◽  
Rui Zhang ◽  
Weiwei Han

Author(s):  
Kache Vishwamithra ◽  
G Santhosh Abhinai ◽  
S Aakash ◽  
M Rajvel

In passed-on overseeing, assets are everything considered in the cloud master's connection and dependably got the idea by the cloud clients through open channels. The key system decorations with a got channel foundation over a public channel for the ensured trades between a cloud client and a cloud ace association. The stream key design shows for passed on figuring experience the risky effects of express inconveniences, e.g., seeing low connection delay, disposing of verbalization the central issues, restoring client accreditation, and putting forth an attempt not to stun haphazardness. To manage these heaps, we propose a less testament 0-RTT dull AKA show against baffling eccentricity for secure station foundation in passed-on figuring. As a 0-RTT show, it as a rule speeds up the sensibility of the got channel foundation measure. Further, our show needn't unwind up around with the highlights of an infuriating circumstance a public key with a substance's character and beginning now and for an earnest period of time handles the check of the beginning issue. At long last, a solid security assessment of the show is other than proposed. The show doesn't just fulfill the standard security credits (e.g., known-key security, dull key-share), yet in like manner, solid security ensures, i.e., client certification and puzzling anomaly get.


2021 ◽  
Vol 19 (1) ◽  
pp. 66-85
Author(s):  
Yanrong Lu ◽  
◽  
Dawei Zhao ◽  

<abstract><p>Designing a secure authentication scheme for session initial protocol (SIP) over internet protocol (VoIP) networks remains challenging. In this paper, we revisit the protocol of Zhang, Tang and Zhu (2015) and reveal that the protocol is vulnerable to key-compromise impersonation attacks. We then propose a SIP authenticated key agreement protocol (AKAP) using elliptic curve cryptography (ECC). We demonstrate the correctness of the protocol using Burrows-Abadi-Needham (BAN), and its security using the AVISPA simulation tool. We also evaluate its performance against those of Zhang, Tang and Zhu, and others.</p></abstract>


2008 ◽  
Vol 13 (6) ◽  
pp. 645-650
Author(s):  
Haibo Tian ◽  
Xiaofeng Chen ◽  
Fangguo Zhang ◽  
Baodian Wei

Sign in / Sign up

Export Citation Format

Share Document