A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing
Y Li, Q Cheng, X Liu, X Li - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
Mobile edge computing (MEC) provides computing and data storage capabilities within the
range of the wireless access network close to the users, which is driving the need for new …
range of the wireless access network close to the users, which is driving the need for new …
After-the-fact leakage-resilient identity-based authenticated key exchange
O Ruan, Y Zhang, M Zhang, J Zhou… - IEEE Systems …, 2017 - ieeexplore.ieee.org
Authenticated key exchange (AKE) scheme is one of the most widely used cryptographic
primitives in practice, even in the Internet-of-Things (IoT) environments. In order to resist side …
primitives in practice, even in the Internet-of-Things (IoT) environments. In order to resist side …
Outsider key compromise impersonation attack on a multi-factor authenticated key exchange protocol
Z Ma, J He - International Conference on Applied Cryptography and …, 2022 - Springer
Authenticated key exchange (AKE) protocol is a security mechanism that ensures two
parties communicate securely on a public channel and keeps the legal client interacting with …
parties communicate securely on a public channel and keeps the legal client interacting with …
Provably leakage-resilient password-based authenticated key exchange in the standard model
The password-based authenticated key exchange (PAKE) protocol is one of most practical
cryptographic primitives for trusted computing, which is used to securely authenticate …
cryptographic primitives for trusted computing, which is used to securely authenticate …
New constructions for (multiparty) one-round key exchange with strong security
Z Yang, J Lai - Science China. Information Sciences, 2018 - search.proquest.com
Dear editor, One-round key exchange (ORKE) represents a special class of two-message
key exchange. It enables two parties to establish a shared session key within only one …
key exchange. It enables two parties to establish a shared session key within only one …
[PDF][PDF] Cryptanalysis and Improvement of a Multi-factor Authenticated Key Exchange Protocol
Z Ma, J He - International Journal of Network Security, 2023 - ijns.jalaxy.com.tw
Authenticated key exchange (AKE) protocol is one of the most fundamental cryptographic
primitives for secure communication systems. It allows two parties to securely establish a …
primitives for secure communication systems. It allows two parties to securely establish a …
CCA Secure Public Key Encryption against After‐the‐Fact Leakage without NIZK Proofs
In leakage resilient cryptography, there is a seemingly inherent restraint on the ability of the
adversary that it cannot get access to the leakage oracle after the challenge. Recently, a …
adversary that it cannot get access to the leakage oracle after the challenge. Recently, a …
Analysis and improvement of a key exchange and authentication protocol in client-server environment
Y Li, Q Cheng, X Li - Journal of Ambient Intelligence and Humanized …, 2020 - Springer
With the rapid development of mobile communication technologies and network
applications, communication models for mobile client and server interaction are becoming …
applications, communication models for mobile client and server interaction are becoming …
Efficient compilers for after-the-fact leakage: from CPA to CCA-2 secure PKE to AKE
The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are
secure even if the adversary obtains side-channel information from the real world …
secure even if the adversary obtains side-channel information from the real world …
SignORKE: improving pairing‐based one‐round key exchange without random oracles
The study presents a new efficient way to construct the one‐round key exchange (ORKE)
without random oracles based on standard hard complexity assumptions. The authors …
without random oracles based on standard hard complexity assumptions. The authors …