Generalization of Multiple Key Agreement Protocol based on Bilinear Pairings

October 2010
Journal of Digital Information Management;Oct2010, Vol. 8 Issue 5, p298
Academic Journal
No abstract available.


Related Articles

  • Limits of the BRSIM/UC soundness of Dolev—Yao-style XOR. Backes, Michael; Pfitzmann, Birgit // International Journal of Information Security;Jan2008, Vol. 7 Issue 1, p33 

    The abstraction of cryptographic operations by term algebras, called Dolev–Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significant progress was made in proving that Dolev–Yao models can be sound with respect to actual...

  • Simple Dynamic Threshold Decryption Based on CRT and RSA. Nakielski, Bartosz; Pomykała, Jacek // Journal of Telecommunications & Information Technology;2009, Vol. 2009 Issue 2, p70 

    In the paper we present a simple threshold decryption system based on the RSA cryptosystem. Our model avoids the application of the Shamir secret sharing protocol and is based only on the Chinese reminder theorem. The flexibility in the threshold level is attained due to the suitable preparation...

  • Secure Internet of Things Environment using XMPP Protocol. Valluri, Prince Shekhar // International Journal of Computer Applications;Nov2014, Vol. 106 Issue 1-18, p34 

    This paper is an effort to electronically connect everyday physical objects so that communication to all devices can be centralized and handled without any hassles. A centralized control is setup which is not connected to any outside network thus, making it completely secure from intrusion. XMPP...

  • Network-based Steganography using Encryption in TCP/IP Header. Rana, Joshi; Amanpreetkaur; Malik, Nitin // International Journal of Computer Applications;Jul2013, Vol. 74 Issue 1-21, p12 

    Steganography, introduced in 2003, is a techniques used for hidden communication between two covert parties. It is an art of hidden communication. It also relates to the areas like network protocols and security for practical data hiding in communication networks using Transmission Control...

  • NON-INTERACTIVE Σ-PROTOCOL CONSTRUCTION. Polic, Viktor D. // Metalurgia International;Dec2012, Vol. 17 Issue 12, p81 

    Due to their simplicity sigma protocols are frequently used for proving knowledge in more complex cryptographic schemes. Challenge is to find the optimum yet secure construction applicable to the concurrent settings such as communications on the Internet. Possible answer to this problem is usage...

  • Short Signcryption Scheme for the Internet of Things. Xuanwu Zhou; Zhigang Jin; Yan Fu; Huaiwei Zhou; Lianmin Qin // Informatica (03505596);Dec2011, Vol. 35 Issue 4, p521 

    Signcryption is an effective cryptographic primitive, which simultaneously fulfils both the functions of encryption and signature with much lower cost than traditional schemes; it is an ideal method to provide confidentiality and unforgeability and ensure secure data storage and transmission in...

  • A Secure Protocol for Efficient SMS Transmission and Management. Ning Lianju; Feng Xin; Lichi Sun // Journal of Networks;Sep2013, Vol. 8 Issue 9, p2171 

    Recently, the usage of mobile phones around the world is growing more and more. Short Message Service (SMS) is one of the most important applications due to its easy way to send and receive messages from users to users. There have been many transmission protocols aiming to make sure secure and...

  • Security Improvments To The Diffie-Hellman Schemes. Kakish, Malek Jakob // International Journal of Research & Reviews in Applied Sciences;2011, Vol. 8 Issue 1, p79 

    The Diffie-Hellman key agreement protocol and the Diffie-Hellman encryption/decryption cryptosystem are historical the firstly defined Public key cryptosystems that enables communicating parties over unsecure communication channel to agree upon a shared secret key and to encrypt /decrypt...

  • A Simple and Secure Key Agreement Protocol to Integrate a Key Distribution Procedure into the DSS. Shu-Fen Chiou; Min-Shiang Hwang; Song-Kong Chong // International Journal of Advancements in Computing Technology;Oct2012, Vol. 4 Issue 19, p529 

    A simple and secure method to integrate the Diffie-Hellman (DH) key exchange into the Digital Signature Standard (DSS) is presented in this paper. Two parties are able to establish a DH key securely between them over a public channel so our message can be encrypted. We have demonstrated how the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics