[PDF][PDF] Performance analysis of RSA and elliptic curve cryptography.

D Mahto, DK Yadav - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
This paper presents a performance study and analysis of two popular public-key
cryptosystems: RSA with its two variants, and ECC (Elliptic Curve Cryptography). RSA is …

Blockchain‐based patient centric health care communication system

VS Naresh, S Reddi… - International Journal of …, 2021 - Wiley Online Library
The rapid increase in health care data breaches with the existing centralized systems
emphasizes a decentralized health care system while ensuring reliability, privacy, security …

A group key agreement protocol based on ecdh and short signature

Z Yang, Z Wang, F Qiu, F Li - Journal of Information Security and …, 2023 - Elsevier
A group key agreement protocol allows a set of users to establish a common session key
over an open network. A dynamic contributory group key agreement (DCGKA) protocol …

[PDF][PDF] Provably Authenticated Group Key Agreement Based on Braid Groups-The Dynamic Case.

P Hiranvanichakorn - Int. J. Netw. Secur., 2017 - ijns.jalaxy.com.tw
Most group key agreement protocols make use of modular exponential operations which
require extensive computing resources in devices. Thus, they are unsuitable for resource …

Design of ECC based authenticated group key agreement protocol using self-certified public keys

S Gupta, A Kumar, N Kumar - 2018 4th International …, 2018 - ieeexplore.ieee.org
The applications like secure conferences, Pay-TV system etc. are usually requires a
common key (group key) shared among the participants. The applications in which the …

An efficient conference key agreement protocol suited for resource constrained devices

M Pundir, A Kumar - Journal of Parallel and Distributed Computing, 2025 - Elsevier
Conference key agreement (CKA) is essential for securing communication in group-oriented
scenarios like multi-party messaging and collaborative environments. While elliptic curve …

[PDF][PDF] Security Analysis of One Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0

K Song, L Liu - International Journal of Electronics and …, 2024 - ijeie.jalaxy.com.tw
We show that Xu et al.'s authentication and key agreement scheme [IEEE Trans. Ind.
Informatics, 18 (10), 7118-7127, 2022] fails to realize its design targets.(1) It confused some …

Reviews and analyses the privacy-protection system for multi-server

MS Hwang, EF Cahyadi, SF Chiou… - Journal of Physics …, 2019 - iopscience.iop.org
Zhu proposed a provable privacy-protection system which could achieve two kinds of
privacy protection and switch between them optionally by users. He claimed his scheme …

Efficient Group Key Establishment Protocol in Resource-Constrained Environments Using Identity-Based Cryptography

M Pundir, A Kumar - … Conference on Algorithms and Computational Theory …, 2024 - Springer
Group key establishment is a fundamental aspect of secure communication in various
network scenarios, ranging from collaborative environments to distributed systems …

[PDF][PDF] Group Rekeying Scheme for Dynamic Peer Group Security in Collaborative Networks.

D Li, S Sampalli - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
Contributory group key management schemes are popularly used for dynamic peer group
communications in collaborative environments. Previous contributory group key …