Improved authentication key exchange protocol without using one-way hash function

2004 ◽  
Vol 38 (2) ◽  
pp. 85-92 ◽  
Author(s):  
Narn-Yih Lee ◽  
Chien-Nan Wu
2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Yi Liang Han ◽  
Yu Li ◽  
Zhe Li ◽  
Shuai Shuai Zhu

The synchronization between two neural networks by mutual learning can be used to design the neural key exchange protocol. The critical issue is how to evaluate the synchronization without a weight vector. All existing methods have a delay in evaluating the synchronization, which affects the security of the neural key exchange. To evaluate the full synchronization of neural networks more timely and accurately, an improved method for evaluating the synchronization is proposed. First, the frequency that the two networks have the same output in previous steps is used for assessing the degree of them roughly. Second, the hash function is utilized to judge whether the two networks have achieved full synchronization precisely when the degree exceeds a given threshold. The improved method can find the full synchronization between two networks with no information other than the hash value of the weight vector. Compared with other methods, the full synchronization can be detected earlier by two communication partners which adopt the method proposed in this paper. As a result, the successful probability of geometric is reduced. Therefore, the proposed method can enhance the security of the neural exchange protocol.


2006 ◽  
Vol 1 (2) ◽  
pp. 52-70
Author(s):  
Mohammed A. Tawfiq ◽  
◽  
Sufyan T. Faraj Al-janabi ◽  
Abdul-Karim A. R. Kadhim ◽  
◽  
...  

2010 ◽  
Vol 30 (7) ◽  
pp. 1805-1808
Author(s):  
Shao-feng DENG ◽  
Fan DENG ◽  
Yi-fa LI

2020 ◽  
Vol 9 (12) ◽  
pp. 11169-11177
Author(s):  
A. J. Meshram ◽  
C. Meshram ◽  
S. D. Bagde ◽  
R. R. Meshram

Sign in / Sign up

Export Citation Format

Share Document