ACM Transactions on Computer Systems (TOCS)
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
A note on the use of timestamps as nonces
ACM SIGOPS Operating Systems Review
Several practical protocols for authentication and key exchange
Information Processing Letters
An authentication and key distribution system for open network systems
ACM SIGOPS Operating Systems Review
An attack on a recursive authentication protocol. A cautionary tale
Information Processing Letters
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Timestamps in key distribution protocols
Communications of the ACM
Provably authenticated group Diffie-Hellman key exchange
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
A Secure Fault-Tolerant Conference-Key Agreement Protocol
IEEE Transactions on Computers
Password-Authenticated Key Exchange between Clients with Different Passwords
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Password-based user authentication and key distribution protocols for client-server applications
Journal of Systems and Software
Efficient Authenticated Key-Exchange for Devices with a Trusted Manager
ITNG '06 Proceedings of the Third International Conference on Information Technology: New Generations
Secure Authenticated Key Exchange protocol based on EC using Signcryption Scheme
ICHIT '06 Proceedings of the 2006 International Conference on Hybrid Information Technology - Volume 02
A simple threshold authenticated key exchange from short secrets
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Research: Secure and minimal protocols for authenticated key distribution
Computer Communications
Research note: Group-oriented authentication mechanism with key exchange
Computer Communications
Information Sciences: an International Journal
HOTA: Handover optimized ticket-based authentication in network-based mobility management
Information Sciences: an International Journal
Hi-index | 0.00 |
The authors propose a recursive protocol for group-oriented authentication with key exchange, in which a group of n entities can authenticate with each other and share a group session key. The proposed protocol has the following characteristics: First, it requires O(n) rounds of messages, O(logn) completion time, O(logn) waiting time, and O(nlogn) communication overhead in average for the completion of the recursion. Second, it not only meets the five principles suggested by Diffie et al. [Diffie, W., van Oorschot, P.C., Wiener, M.J., 1992. Authentication and authenticated key exchange. Designs, Codes, and Cryptography 2 (2), 107-125] on the design of a secure key exchange protocol, but also achieves the properties of nondisclosure, independency, and integrity addressed by Janson and Tsudik [Janson, P., Tsudik, G., 1995. Secure and minimal protocols for authenticated key distribution. Computer Communications 18 (9), 645-653] for the authentication of the group session key. Third, we describe the beliefs of trustworthy entities involved in our authentication protocol and the evolution of these beliefs as a consequence of communication by using BAN logic. Finally, it is practical and efficient, because only one-way hash function and exclusive-or (XOR) operations are used in implementation.