[HTML][HTML] A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication
Recently, many identity-based two-party authenticated key agreement (ID-2PAKA) protocols
using elliptic curve cryptography (ECC) have been proposed, however, these protocols do
not provide adequate security and their computation costs are also relatively high due to
bilinear pairing and map-to-point function. Moreover, they require many communication
rounds for establishing the session key, and thus results in increased communication
latency, which makes them unsuitable for real applications. This paper thus aims to propose …
using elliptic curve cryptography (ECC) have been proposed, however, these protocols do
not provide adequate security and their computation costs are also relatively high due to
bilinear pairing and map-to-point function. Moreover, they require many communication
rounds for establishing the session key, and thus results in increased communication
latency, which makes them unsuitable for real applications. This paper thus aims to propose …
A pairing free identity based two party authenticated key agreement protocol using hexadecimal extended ascii elliptic curve cryptography
In wireless sensor network (WSN), the secure communication and exchange of confidential
information between nodes is a challenging task. To eliminate the security flaws WSN
adopts authenticated cryptography mechanisms. The authenticated key agreement protocol
guarantees the reality of the users and negotiates the shared session key. In the past years,
the two-way authentication scheme has been proved as a better approach for secure and
energy efficient communication over Bin and Balls Authentication scheme, Timed Efficient …
information between nodes is a challenging task. To eliminate the security flaws WSN
adopts authenticated cryptography mechanisms. The authenticated key agreement protocol
guarantees the reality of the users and negotiates the shared session key. In the past years,
the two-way authentication scheme has been proved as a better approach for secure and
energy efficient communication over Bin and Balls Authentication scheme, Timed Efficient …
以上显示的是最相近的搜索结果。 查看全部搜索结果