Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection

被引:0
|
作者
Zhu, Dan [1 ]
Wang, Liwei [2 ]
Zhu, Hongfeng [2 ]
机构
[1] School of Foreign Languages, Shenyang Jianzhu University, No.9, HunNan East Street, HunNan District, Shenyang,110168, China
[2] Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang,110034, China
来源
关键词
12;
D O I
10.6633/IJNS.20210323(2).11
中图分类号
学科分类号
摘要
引用
收藏
页码:278 / 285
相关论文
共 50 条
  • [1] Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones
    Lee, Tian-Fu
    Ye, Xiucai
    Huang, Wei-Jie
    Journal of Information Security and Applications, 2024, 87
  • [2] Enhancing lightweight authenticated key agreement with privacy protection using dynamic identities for Internet of Drones
    Lee, Tian-Fu
    Lou, Der-Chyuan
    Chang, Chien-Hung
    INTERNET OF THINGS, 2023, 23
  • [3] Physically Secure and Conditional-Privacy Authenticated Key Agreement for VANETs
    Liang, Yangfan
    Luo, Entao
    Liu, Yining
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (06) : 7914 - 7925
  • [4] Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
    Bringer, Julien
    Chabanne, Herve
    Icart, Thomas
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 77 - 91
  • [5] Cryptanalysis of Two Tripartite Authenticated Key Agreement Protocols
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    14TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS FOR BUSINESS, ENGINEERING AND SCIENCE (DCABES 2015), 2015, : 159 - 162
  • [6] Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT
    Hsu, Chingfang
    Harn, Lein
    Xia, Zhe
    Zhao, Zhuo
    Xu, Hang
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (04) : 2403 - 2417
  • [7] Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT
    Chingfang Hsu
    Lein Harn
    Zhe Xia
    Zhuo Zhao
    Hang Xu
    Wireless Personal Communications, 2023, 129 : 2403 - 2417
  • [8] An efficient multi-factor authenticated key exchange with physically unclonable function
    Byun, Jin Wook
    2019 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2019, : 477 - 480
  • [9] Certificateless authenticated two-party key agreement Protocols
    Mandt, Tarjei K.
    Tan, Chik How
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 37 - 44
  • [10] Security properties of two authenticated conference key agreement protocols
    Tang, Q
    Mitchell, CJ
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 304 - 314