-
Article
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
Three-party authenticated key exchange (3PAKE) protocol allows two communication users to authenticate each other and to establish a secure common session key with the help of a trusted remote server. Recently...
-
Article
A fair and secure group buying system based on arbitration computing mechanism
Trading is a mutually agreeable process. Buyers hope that they can buy their favorite goods or services through trading, and merchants hope that they can obtain a reasonable profit. If friends or family of a b...
-
Article
A secure key authentication scheme for cryptosystems based on GDLP and IFP
The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fi...