Using non-commutative monoids for construct three-party key establishment
Three-party key establishment protocol can help three participants to establish a shared secret key through interactions via public channels. In this paper, a novel three-party key agreement protocol is proposed. The protocol is based on non-commutative monoids in mathematics. It is a generic constr...
| Main Authors: | Han, Song, Chang, Elizabeth, Dillon, Tharam S. |
|---|---|
| Other Authors: | Chang |
| Format: | Conference Paper |
| Published: |
Institute of Electrical and Electronics Engineers (IEEE)
2008
|
| Online Access: | http://hdl.handle.net/20.500.11937/32219 |
Similar Items
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
Sticker systems over monoids
by: Mohd Sebry, Nurul Afidah, et al.
Published: (2012)
by: Mohd Sebry, Nurul Afidah, et al.
Published: (2012)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Aspherical Weight Test for Mixed Monoid Presentation
by: Tay, Choo Chuan, et al.
Published: (2008)
by: Tay, Choo Chuan, et al.
Published: (2008)
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
Kesferaan Dan Kumpulan Gambar Rajah Bagi Persembahan Monoid Campuran
by: Tay, Choo Chuan, et al.
Published: (2007)
by: Tay, Choo Chuan, et al.
Published: (2007)
An authenticated self-healing key distribution scheme based on bilinear pairings
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
An efficient self-healing key distribution scheme
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Secure transactions using mobile agents with TTP
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Secure e-transactions protocol using intelligent mobile agents with fair privacy
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
by: Phan, Raphael C.-W., et al.
Published: (2008)
by: Phan, Raphael C.-W., et al.
Published: (2008)
Degree subtraction energy of commuting and non-commuting graphs for dihedral groups
by: Romdhini, Mamika Ujianita, et al.
Published: (2023)
by: Romdhini, Mamika Ujianita, et al.
Published: (2023)
Chaotic map based key agreement with/out clock synchronization
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Anonymous mutual authentication protocol for RFID tag without back-end database
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Secure electronic commerce with mobile agents
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Neighbors degree sum energy of commuting and non-commuting graphs for dihedral groups
by: Romdhini, M. U., et al.
Published: (2023)
by: Romdhini, M. U., et al.
Published: (2023)
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
by: Tian, Biming, et al.
Published: (2010)
by: Tian, Biming, et al.
Published: (2010)
A mutual-healing key distribution scheme in wireless sensor networks
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
RFID mutual authentication protocols for tags and readers with and without a server
by: Han, Song, et al.
Published: (2013)
by: Han, Song, et al.
Published: (2013)
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Cost-Benefit Analysis to Hedge with Third Party Producers in Demand-Driven Production
by: Hussain, Omar, et al.
Published: (2010)
by: Hussain, Omar, et al.
Published: (2010)
Monte Carlo simulations of random non-commutative geometries
by: Barrett, John W., et al.
Published: (2016)
by: Barrett, John W., et al.
Published: (2016)
Closeness energy of non-commuting graph for dihedral groups
by: Romdhini, Mamika Ujianita, et al.
Published: (2024)
by: Romdhini, Mamika Ujianita, et al.
Published: (2024)
A three-layered XML view model: A practical approach
by: Rajugan, R., et al.
Published: (2005)
by: Rajugan, R., et al.
Published: (2005)
On diameter of subgraphs of commuting graph in symplectic group for elements of order three
by: Suzila Mohd Kasim,, et al.
Published: (2021)
by: Suzila Mohd Kasim,, et al.
Published: (2021)
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
Visual modeling of ontology views for e-sciences using Xsemantic nets
by: Chang, Elizabeth, et al.
Published: (2007)
by: Chang, Elizabeth, et al.
Published: (2007)
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Wiener-Hosoya energy of non-commuting graph for dihedral groups
by: Romdhini, M.U., et al.
Published: (2024)
by: Romdhini, M.U., et al.
Published: (2024)
Degree sum energy of non-commuting graph for dihedral groups
by: Romdhini, Mamika Ujianita, et al.
Published: (2022)
by: Romdhini, Mamika Ujianita, et al.
Published: (2022)
Using UML 2.1 to model multi-agent systems
by: Dillon, Darshan, et al.
Published: (2008)
by: Dillon, Darshan, et al.
Published: (2008)
Similar Items
-
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009) -
Sticker systems over monoids
by: Mohd Sebry, Nurul Afidah, et al.
Published: (2012) -
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008) -
Aspherical Weight Test for Mixed Monoid Presentation
by: Tay, Choo Chuan, et al.
Published: (2008) -
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009)