Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection

被引:0
|
作者
Zhu, Dan [1 ]
Wang, Liwei [2 ]
Zhu, Hongfeng [2 ]
机构
[1] School of Foreign Languages, Shenyang Jianzhu University, No.9, HunNan East Street, HunNan District, Shenyang,110168, China
[2] Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang,110034, China
来源
关键词
12;
D O I
10.6633/IJNS.20210323(2).11
中图分类号
学科分类号
摘要
引用
收藏
页码:278 / 285
相关论文
共 50 条
  • [31] Comments on Physically Unclonable Function Based Two-Factor Authentication Protocols
    Jin Wook Byun
    Ik Rae Jeong
    Wireless Personal Communications, 2019, 106 : 1243 - 1252
  • [32] A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols
    Swanson, Colleen
    Jao, David
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 57 - +
  • [33] Authenticated key agreement scheme with privacy-protection in the three-party setting
    Lin, J.-P. (jplin@mail.chihlee.edu.tw), 1600, Femto Technique Co., Ltd. (15):
  • [34] Security of authenticated multiple-key agreement protocols
    Wu, TS
    He, WH
    Hsu, CL
    ELECTRONICS LETTERS, 1999, 35 (05) : 391 - 392
  • [35] Tripartite authenticated key agreement protocols from pairings
    Al-Riyami, SS
    Paterson, KG
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 332 - 359
  • [36] A Survey of Authenticated Key Agreement Protocols for Securing IoT
    Mohammad, Zeyad
    Abusukhon, Ahmad
    Abu Qattam, Thaer
    2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 425 - 430
  • [37] Authenticated Diffie-Hellman key agreement protocols
    Blake-Wilson, S
    Menezes, A
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 339 - 361
  • [38] New secure explicitly authenticated key agreement protocols
    Abouelseoud, Y.
    Nabil, M.
    IAENG TRANSACTIONS ON ENGINEERING SCIENCES, 2014, : 357 - 368
  • [39] Certificate-Based Authenticated Key Agreement Protocols
    Nabil, Mohamed
    Abouelseoud, Yasmine
    Elkobrosy, Galal
    Abdelrazek, Amr
    2013 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS TECHNOLOGY (ICCAT), 2013,
  • [40] Security analysis on tripartite authenticated key agreement protocols
    Li Hao
    Dai Jufeng
    Gao Junping
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +