Search
Search Results
-
A Hybrid Post-Quantum Cryptography Driven Key Exchange Scheme for Cloud Computing Environments
In connection with Post-Quantum Cryptography (PQC), it is indispensable to upgrade cloud data security schemes and also key exchange schemes. The... -
RETRACTED ARTICLE: A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network
As related to environments which possess non-malicious nodes contained in a network, the well-known protocols that are provides by the existing...
-
OpenPGP Email Forwarding via Diverted Elliptic Curve Diffie-Hellman Key Exchanges
An offline OpenPGP user might want to forward part or all of their email messages to third parties. Given that messages are encrypted, this requires... -
Key Exchange Protocol Based on the Matrix Power Function Defined Over
In this paper we propose a key exchange protocol (KEP) based on the so-called matrix power function (MPF) defined over a non-commuting platform... -
An innovative key agreement protocol with complex attribute authentication based on blockchain
In cloud environment, attribute-based key agreement (AB-KA) protocol can be applied in the practical scenario of achieving session key by mutual...
-
Study of Key Agreement Protocol Implementation in Constraint Environment
The key establishment (agreement) protocol constructed using public key cryptography (like RSA, D–H key exchange, Elliptic Curve Cryptography) can... -
Non-invertible key exchange protocol
We investigate a cryptosystem through what we call non-invertible cryptography. As a result of a continuous refinement process, we present a new key...
-
Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networks
Fifth Generation (5G) networks provide data communications through various latest technologies including Software Defined Networks (SDN), Artificial...
-
GDH Key Exchange Protocol for Group Security Among Hypercube Deployed IoT Devices
Effective deployment of IoT devices to preserve security, with minimum computations and energy consumption will be great challenge in the current... -
An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution
One of the most flamboyant technological novelties of today's world is cloud computing, which has been fuelled by the increase in the number of smart...
-
A Novel Post-quantum Piekert’s Reconciliation-Based Forward Secure Authentication Key Agreement for Mobile Devices
Lattice-based cryptography plays a very important role in authentication and key exchanges that protects against the threat of quantum attacks.... -
Concurring of Neural Machines for Robust Session Key Generation and Validation in Telecare Health System During COVID-19 Pandemic
In this technique, it has been proposed to agree the session keys that have been generated through dual artificial neural networks based on the...
-
A Paring-Free ID-Based Authenticated Key Agreement Protocol for IoT Environment
The Internet of Things (IoT) has become a growing technology now a days. IoT security aspect needs an authenticated session key in view of the... -
A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids
There exists a problem of user privacy leakage in the smart grids (SGs) that malicious attackers may intercept or tamper with electricity data and...
-
Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries
Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing...
-
Validate Merchant Server for Secure Payment Using Key Distribution
Nowadays, growing and competitiveness of a financial sector and e-healthcare application developed rapidly and quicker ever so that mobile payment... -
Analysis and improvement of a key exchange and authentication protocol in client-server environment
With the rapid development of mobile communication technologies and network applications, communication models for mobile client and server...
-
Two-Server 3D ElGamal Diffie-Hellman Password Authenticated and Key Exchange Protocol Using Geometrical Properties
In the contemporary world, Internet based services undoubtedly plays a vital role in supporting business processes. Yet, these services suffer from...
-
A public key cryptosystem and signature scheme based on numerical series
A public key cryptosystem and signature scheme based on a proposed key exchange algorithm are introduced. The key exchange algorithm is based on the...