Provably secure constant round contributory group key agreement in dynamic setting

R Dutta, R Barua - IEEE Transactions on Information Theory, 2008 - ieeexplore.ieee.org
In this paper, we present and analyze a variant of Burmester-Desmedt group key agreement
protocol (BD) and enhance it to dynamic setting where a set of users can leave or join the …

A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography

K Jain, P Krishnan, VV Rao - 2021 Fourth International …, 2021 - ieeexplore.ieee.org
Cryptography is the science of encryption and decryption of data using the techniques of
mathematics to achieve secure communication. This enables the user to send the data in an …

Survey and taxonomy of key management protocols for wired and wireless networks

A Kumar, A Aggarwal - … Journal of Network Security & Its …, 2012 - search.proquest.com
The purpose of this paper is to survey the key management protocols for wired and wireless
networks and study their security aspects in terms of key generation, agreement and …

Provably secure pseudo-identity three-factor authentication protocol based on extended chaotic-maps for lightweight mobile devices

D Suresh, V Odelu, AG Reddy, K Phaneendra… - IEEE …, 2022 - ieeexplore.ieee.org
Authentication and key agreement (AKA) play a major role in an open network environment
to communicate between two or more participants securely. Authentication and key …

A provably secure cluster-based hybrid hierarchical group key agreement for large wireless ad hoc networks

VS Naresh, S Reddi, NVES Murthy - Human-centric Computing and …, 2019 - Springer
Group key agreement protocol permits a set of users to create a common key to make sure
security of information exchange among members of the group. It is extensively used in …

An authenticated, secure, and mutable multiple‐session‐keys protocol based on elliptic curve cryptography and text‐to‐image encryption algorithm

A Abusukhon, Z Mohammad… - … Practice and Experience, 2022 - Wiley Online Library
Most of the key agreement protocols (eg, Menezes–Qu–Vanstone [MQV] family) generate
one common key per session. This leaves the session key vulnerable against various …

Efficient and secure key exchange protocol based on elliptic curve and security models

A Abusukhon, Z Mohammad… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
nowadays, the success of many online applications relays on keeping the data sent through
the global network secure and far away from hackers. To carry out this task, the two …

Two proposed identity-based three-party authenticated key agreement protocols from pairings

M Hölbl, T Welzer, B Brumen - computers & security, 2010 - Elsevier
The use of pairings has been shown promising for many two-party and three-party identity-
based authenticated key agreement protocols. In recent years, several identity-based …

Toward pairing-free certificateless authenticated key exchanges

H Xiong, Q Wu, Z Chen - … Security: 14th International Conference, ISC 2011 …, 2011 - Springer
Certificateless authenticated key exchange (CL-AKE) protocols do not suffer from intricate
certificate management or heavy trust reliance on a third party. Unfortunately, these …

Constant round group key agreement protocols: A comparative study

E Makri, E Konstantinou - computers & security, 2011 - Elsevier
The scope of this paper is to review and evaluate all constant round Group Key Agreement
(GKA) protocols proposed so far in the literature. We have gathered all GKA protocols that …