4.6 Article

Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Quantum-Safe Round-Optimal Password Authentication for Mobile Devices

Zengpeng Li et al.

Summary: Password authentication is a dominant form of access control for the Web and mobile devices, and the use of Password Authenticated Key Exchange (PAKE) systems is recommended for secure data communication. The industry standard suggests using asymmetric-PAKE protocols to prevent password exposure.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices

Shuming Qiu et al.

Summary: This article proposes a provably secure three-factor AKA protocol based on extended chaotic-maps for mobile lightweight devices. By utilizing Fuzzy-Verifiers and Honeywords techniques, the protocol achieves a good balance between security and usability.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Artificial Intelligence

Ternary subset difference revocation in public key framework supporting outsider anonymity

Kamalesh Acharya et al.

Summary: This paper presents an efficient broadcast encryption scheme in public key setting employing ternary tree subset difference method for revocation, utilizing composite order bilinear group setting and providing outsider-anonymity. By reducing the ciphertext and public key size, as well as achieving revocation property and selective semantic security, the constructions proposed in this paper offer practical solutions for secure communication.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Computer Science, Information Systems

Key Management Scheme for Secure Channel Establishment in Fog Computing

Lei Zhang

Summary: The paper proposes a key management scheme called DConBE for secure channel establishment in fog computing, allowing fog nodes to negotiate public encryption keys and decryption keys, achieving fog node dynamics, full collusion resistance, and statelessness.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Computer Science, Theory & Methods

Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption

Minh Ha Le et al.

THEORETICAL COMPUTER SCIENCE (2020)

Article Computer Science, Information Systems

CL-AGKA: certificateless authenticated group key agreement protocol for mobile networks

Susmita Mandal et al.

WIRELESS NETWORKS (2020)

Article Telecommunications

Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)

D. Manivannan et al.

VEHICULAR COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Anonymous Certificate-Based Broadcast Encryption With Personalized Messages

Liqing Chen et al.

IEEE TRANSACTIONS ON BROADCASTING (2020)

Article Engineering, Civil

A Survey of Vehicular Cloud Research: Trends, Applications and Challenges

Stephan Olariu

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2020)

Article Computer Science, Information Systems

Dynamic asymmetric group key agreement protocol with traitor traceability

Jikai Teng et al.

IET INFORMATION SECURITY (2019)

Article Computer Science, Information Systems

Constant-round authenticated and dynamic group key agreement protocol for D2D group communications

Linjie Wang et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

A Survey on Mobile Crowdsensing Systems: Challenges, Solutions, and Opportunities

Andrea Capponi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Certificateless and identity-based authenticated asymmetric group key agreement

Lei Zhang et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2017)

Article Computer Science, Theory & Methods

OTIBAAGKA: A New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc Networks

Lei Zhang

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol

Jiangtao Li et al.

INFORMATION SCIENCES (2017)

Review Telecommunications

A survey on authentication schemes in VANETs for secured communication

Sunilkumar S. Manvi et al.

VEHICULAR COMMUNICATIONS (2017)

Article Computer Science, Information Systems

Broadcast encryption with dealership

Clementine Gritti et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2016)

Article Computer Science, Theory & Methods

Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications

Lei Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Mathematics, Applied

Authenticated asymmetric group key agreement based on certificateless cryptosystem

Xixiang Lv et al.

INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS (2014)

Article Computer Science, Information Systems

Provably secure one-round identity-based authenticated asymmetric group key agreement protocol

Lei Zhang et al.

INFORMATION SCIENCES (2011)