Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection

被引:0
|
作者
Zhu, Dan [1 ]
Wang, Liwei [2 ]
Zhu, Hongfeng [2 ]
机构
[1] School of Foreign Languages, Shenyang Jianzhu University, No.9, HunNan East Street, HunNan District, Shenyang,110168, China
[2] Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang,110034, China
来源
关键词
12;
D O I
10.6633/IJNS.20210323(2).11
中图分类号
学科分类号
摘要
引用
收藏
页码:278 / 285
相关论文
共 50 条
  • [31] Authenticated key agreement scheme with privacy-protection in the three-party setting
    Lin, J.-P. (jplin@mail.chihlee.edu.tw), 1600, Femto Technique Co., Ltd. (15):
  • [32] Authenticated Diffie-Hellman key agreement protocols
    Blake-Wilson, S
    Menezes, A
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 339 - 361
  • [33] Security of authenticated multiple-key agreement protocols
    Wu, TS
    He, WH
    Hsu, CL
    ELECTRONICS LETTERS, 1999, 35 (05) : 391 - 392
  • [34] Tripartite authenticated key agreement protocols from pairings
    Al-Riyami, SS
    Paterson, KG
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 332 - 359
  • [35] A Survey of Authenticated Key Agreement Protocols for Securing IoT
    Mohammad, Zeyad
    Abusukhon, Ahmad
    Abu Qattam, Thaer
    2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 425 - 430
  • [36] New secure explicitly authenticated key agreement protocols
    Abouelseoud, Y.
    Nabil, M.
    IAENG TRANSACTIONS ON ENGINEERING SCIENCES, 2014, : 357 - 368
  • [37] Certificate-Based Authenticated Key Agreement Protocols
    Nabil, Mohamed
    Abouelseoud, Yasmine
    Elkobrosy, Galal
    Abdelrazek, Amr
    2013 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS TECHNOLOGY (ICCAT), 2013,
  • [38] Security analysis on tripartite authenticated key agreement protocols
    Li Hao
    Dai Jufeng
    Gao Junping
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +
  • [39] Provably secure and password-authenticated hybrid key agreement protocol in two-realm with privacy-protection
    Zhu, Dan
    Zhu, Hong Feng
    Geng, Shuai
    Wang, Rui
    Journal of Information Hiding and Multimedia Signal Processing, 2018, 9 (04): : 775 - 784
  • [40] Two improved two-party identity-based authenticated key agreement protocols
    Holbl, Marko
    Welzer, Tatjana
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1056 - 1060