Using one-way functions for authentication
ACM SIGCOMM Computer Communication Review
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking (TON)
Relations between secrets: two formal analyses of the Yahalom protocol
Journal of Computer Security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A Class of Flexible and Efficient Key Management Protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
Hi-index | 0.00 |
In this work, we have identified a class of weakness named as insider-replay attack in a number of existing protocols and propose a common design principle to avoid the weakness. Also, based on the design principles, we propose three key establishment schemes under two different scenarios. The proposed schemes are efficient in terms of number of nonce used and are based on one-way functions.