“These gems have life in them. Their colors speak, say what words fail of.“ – George Eliot

Key Agreement Technique

Many key exchange systems allow one party to generate the key and send that key simply to the other party – the other party has no influence on the key. Using a key-agreement protocol avoids some key distribution issues related to these systems. If the sender and receiver wish to exchange encrypted messages, each must be equipped for encrypting the messages to be sent and decrypting the messages received. The type of equipment they need depends on the encryption technique they can use. If they use a code, they both need a copy of the same code. If they use code, they need appropriate keys. If it is a symmetric key code, both must have a copy of the same key. If it is an asymmetric key with public/private key ownership, both need the public key of the other. We give a key protocol based on two attributes (TP-AB-KA). There are 3 roles, trusted authority () and two participants (initiator and responder). is a trusted role that monitors participants` attributes and their private key addresses. Two participants and , conclude an important agreement as shown in Figure 1.

Definition 2. The protocol is a key protocol of understanding secured when (1) the adversary`s messages are transmitted faithfully. Both and are always accepted and hold the same session key, which is evenly distributed; (2) is negligible. A secure key memorandum of understanding is defined as follows. The algorithms of the password-authenticated key agreement can perform a cryptographic exchange of keys in which a user`s password is known. The first publicly known public key memorandum of understanding[1] that meets the above criteria was the Diffie-Hellman key exchange, in which two parties together expose a random generator in such a way that a listener cannot determine in a feasible way what is the resulting value used to make a common key. Key exchange protocols allow two or more parties to set up a common encryption key that allows them to encrypt or sign data they wish to exchange. Key exchange protocols typically use cryptography to achieve this goal.

To achieve this goal, different cryptographic techniques can be used. Authenticated key protocols require the separate setting of a password (which can be smaller than a key) in a way that is both private and integrity. These are designed to withstand man-in-the-middle attacks and other active attacks against the password and established keys. For example, DH-EKE, SPEKE, and SRP are authenticated variations of Diffie-Hellman. The key agreement (KA) protocol is an important part of cryptography. By creating a meeting key, the KA protocol provides confidentiality, integrity, and availability security services for open communication on the network node. Recently, the key two-part protocol (TP-AB-KA) was first proposed in [1]. In the TP-AB-KA protocol, attribute-based encryption (ABE) for the exchange of secret messages was taken up by two participants. This type of minutes performs negotiation-based meeting keys based on mutual authentication of participants` attribute information.

Sahai and Waters [2] first proposed ABE, which was used for fine-grained access control for cloud storage. The identity of the user is determined by its attributes….

Posted in Uncategorized 4 months ago at 1:23 am.

Add a comment


Comments are closed.