Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,430,337 papers from all fields of science
Search
Sign In
Create Free Account
Key-agreement protocol
Known as:
Key agreement
, Key agreement protocol
In cryptography, a key-agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
38 relations
Alice and Bob
Bluetooth
Certificate authority
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Privacy-Preserved, Provable Secure, Mutually Authenticated Key Agreement Protocol for Healthcare in a Smart City Environment
S. Khatoon
,
S. Rahman
,
Majed Alrubaian
,
Atif Alamri
IEEE Access
2019
Corpus ID: 131776342
Smart home systems can provide health care services for people with special needs in their own homes. Briefly defined, such a…
Expand
2016
2016
Multi-party quantum key agreement protocol secure against collusion attacks
Ping Wang
,
Zhiwei Sun
,
Xiaoqiang Sun
Quantum Information Processing
2016
Corpus ID: 9241903
The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer…
Expand
Highly Cited
2014
Highly Cited
2014
Novel multiparty quantum key agreement protocol with GHZ states
Guangbao Xu
,
Q. Wen
,
F. Gao
,
S. Qin
Quantum Information Processing
2014
Corpus ID: 31332718
In many circumstances, a shared key is needed to realize secure communication. Based on quantum mechanics principles, quantum key…
Expand
Highly Cited
2012
Highly Cited
2012
A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
S. H. Islam
,
G. P. Biswas
Annales des télécommunications
2012
Corpus ID: 11916150
The secure and reliable group communication gains popularity in imbalanced mobile networks due to the increase demand of the…
Expand
Highly Cited
2009
Highly Cited
2009
Security Analysis of the PACE Key-Agreement Protocol
Jens Bender
,
M. Fischlin
,
D. Kügler
Information Security Conference
2009
Corpus ID: 665060
We analyze the Password Authenticated Connection Establishment (PACE) protocol for authenticated key agreement, recently proposed…
Expand
Highly Cited
2007
Highly Cited
2007
Robust key generation from signal envelopes in wireless networks
Babak Azimi-Sadjadi
,
A. Kiayias
,
A. Mercado
,
B. Yener
Conference on Computer and Communications…
2007
Corpus ID: 3232324
The broadcast nature of a wireless link provides a natural eavesdropping and intervention capability to an adversary. Thus…
Expand
Highly Cited
2005
Highly Cited
2005
Secure and efficient key management in mobile ad hoc networks
Bing Wu
,
Jie Wu
,
E. Fernández
,
M. Ilyas
,
S. Magliveras
IEEE International Parallel and Distributed…
2005
Corpus ID: 747002
Highly Cited
2002
Highly Cited
2002
A Secure Fault-Tolerant Conference-Key Agreement Protocol
Wen-Guey Tzeng
IEEE Trans. Computers
2002
Corpus ID: 206391449
When a group of people want to communicate securely over an open network, they run a conference-key protocol to establish a…
Expand
Highly Cited
2001
Highly Cited
2001
New Key Agreement Protocols in Braid Group Cryptography
Iris Anshel
,
M. Anshel
,
Benji Fisher
,
D. Goldfeld
The Cryptographer's Track at RSA Conference
2001
Corpus ID: 8089530
Key agreement protocols are presented whose security is based on the difficulty of inverting one-way functions derived from hard…
Expand
Highly Cited
1993
Highly Cited
1993
Extending cryptographic logics of belief to key agreement protocols
P. V. Oorschot
Conference on Computer and Communications…
1993
Corpus ID: 16122168
The authentication logic of Burrows, Abadi and Needham (BAN) provided an important step towards rigourous analysis of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE