Search
Search Results
-
Secure Text Transfer Using Diffie–Hellman Key Exchange Algorithm in Cloud Environment
Secure text transfer is a process of securely transferring text-based data over a shared network, ensuring that the data remains confidential and... -
Hybrid: (NH–DH) a New Hope and Diffie–Hellman for Transmission Data in Cloud Environment
Since the creation of cloud computing and its widespread usage, data security was a significant problem. Different frameworks were suggested;... -
A Lattice-Based Key Exchange Protocol Over NTRU-NIP
We introduce NTRU-NIP-KE, a novel non-invertible polynomial (NTRU-NIP)-based key exchange protocol that is immune to quantum attacks. NTRU-NIP offers... -
A Hybrid Post-Quantum Cryptography Driven Key Exchange Scheme for Cloud Computing Environments
In connection with Post-Quantum Cryptography (PQC), it is indispensable to upgrade cloud data security schemes and also key exchange schemes. The... -
A Three-Factor Authenticated Mobile Key Exchange Protocol Using Matrices Over Group Ring Structure
Firstly, we know that the RSA/Discrete Logarithm assumptions don’t support devices with low computing. The factorization with discrete logarithm... -
An innovative key agreement protocol with complex attribute authentication based on blockchain
In cloud environment, attribute-based key agreement (AB-KA) protocol can be applied in the practical scenario of achieving session key by mutual...
-
Key Exchange Protocol Based on the Matrix Power Function Defined Over
In this paper we propose a key exchange protocol (KEP) based on the so-called matrix power function (MPF) defined over a non-commuting platform... -
Key Agreement Using Symmetric Group
The utilization of key agreement protocols within the domain of cryptography is indispensable for ensuring secure and confidential communication... -
Ephemeral Elliptic Curve Diffie-Hellman to Secure Data Exchange in Internet of Medical Things
The COVID-19 epidemic has accelerated the deployment of remote healthcare monitoring with the overload of hospitals with patients requiring immediate... -
Study of Key Agreement Protocol Implementation in Constraint Environment
The key establishment (agreement) protocol constructed using public key cryptography (like RSA, D–H key exchange, Elliptic Curve Cryptography) can... -
Prevention of the Man-in-the-Middle Attack on Diffie–Hellman Key Exchange Algorithm: A Review
In this report, we demonstrate the pros and cons of Diffie–Hellman key exchange algorithm that is commonly used for the exchange of keys in... -
Security Issues and Solutions in Post Quantum Authenticated Key Exchange for Mobile Devices
An authenticated mobile key exchange is necessary for post quantum secure communication over a public channel. It enables two parties to establish a... -
Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing
The Vehicular Cloud Computing (VCC) provides significant benefits (e.g., higher resource availability, and low communication latency) to vehicular...
-
A Hybrid Cryptographic Mechanism for Secure Data Transmission in Edge AI Networks
As Edge AI systems become more prevalent, ensuring data privacy and security in these decentralized networks is essential. In this work, a novel...
-
OpenPGP Email Forwarding via Diverted Elliptic Curve Diffie-Hellman Key Exchanges
An offline OpenPGP user might want to forward part or all of their email messages to third parties. Given that messages are encrypted, this requires... -
Hyperchaotic-Based Neural Synchronized Complex Key Exchange in Wireless Sensor Network
This paper presents a hyperchaotic-based neural synchronized complex key exchange for secure transmission in wireless sensor network (WSN). WSNs are...
-
Comparative research on block design-based protocol and blowfish for secured key generation and data sharing on cloud
Confidentiality of maintaining the Electronic Health Records of patients is a major concern to both the patient and Doctor. Sharing the data on cloud...
-
Non-invertible key exchange protocol
We investigate a cryptosystem through what we call non-invertible cryptography. As a result of a continuous refinement process, we present a new key...
-
SOA Based BB84 Protocol for Enhancing Quantum Key Distribution in Cloud Environment
Quantum Key Distribution (QKD) systems are thought to be the best method for securing data in cloud storage and boosting security and privacy. Due to...
-
RETRACTED ARTICLE: A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network
As related to environments which possess non-malicious nodes contained in a network, the well-known protocols that are provides by the existing...