An efficient secret key agreement protocol based on random noise without beacons

IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS International Journal of Computer Mathematics: Computer Systems Theory Pub Date : 2019-10-02 DOI:10.1080/23799927.2019.1671903
Albert Guan
{"title":"An efficient secret key agreement protocol based on random noise without beacons","authors":"Albert Guan","doi":"10.1080/23799927.2019.1671903","DOIUrl":null,"url":null,"abstract":"ABSTRACT Computationally lightweight and unconditionally secure key agreement protocols are very useful for secure communication in public networks, especially for sensors with limited computing resources. In 2017, Guan and Tseng proposed a key agreement protocol which is computationally lightweight and unconditionally secure. In their protocol, it was assumed that the two communicating nodes can receive random bit string from a beacon node. Random bit string plays an important role in the generation of secret keys. With the advancement of hardware and software technologies, sensors may be able to generate good random strings. In this paper, we consider the case that the sensor nodes can generate random bit strings for secret keys. Therefore, no beacon nodes are required. The results of this study show that a key agreement protocol can be much more effective and efficient in the case that the communicating nodes can generate good random bit strings.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.9000,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/23799927.2019.1671903","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Mathematics: Computer Systems Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/23799927.2019.1671903","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

ABSTRACT Computationally lightweight and unconditionally secure key agreement protocols are very useful for secure communication in public networks, especially for sensors with limited computing resources. In 2017, Guan and Tseng proposed a key agreement protocol which is computationally lightweight and unconditionally secure. In their protocol, it was assumed that the two communicating nodes can receive random bit string from a beacon node. Random bit string plays an important role in the generation of secret keys. With the advancement of hardware and software technologies, sensors may be able to generate good random strings. In this paper, we consider the case that the sensor nodes can generate random bit strings for secret keys. Therefore, no beacon nodes are required. The results of this study show that a key agreement protocol can be much more effective and efficient in the case that the communicating nodes can generate good random bit strings.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种高效的无信标随机噪声密钥协议
计算轻量级和无条件安全的密钥协商协议对于公共网络中的安全通信非常有用,特别是对于计算资源有限的传感器。2017年,Guan和Tseng提出了一种计算轻量级且无条件安全的密钥协议。在他们的协议中,假设两个通信节点可以从信标节点接收随机位串。随机位串在密钥生成中起着重要的作用。随着硬件和软件技术的进步,传感器可能会产生好的随机字符串。在本文中,我们考虑了传感器节点可以为密钥生成随机位串的情况。因此,不需要信标节点。研究结果表明,当通信节点能够生成良好的随机比特串时,密钥协议的有效性和效率将大大提高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Computer Mathematics: Computer Systems Theory
International Journal of Computer Mathematics: Computer Systems Theory Computer Science-Computational Theory and Mathematics
CiteScore
1.80
自引率
0.00%
发文量
11
期刊最新文献
On Hendecagonal Circular Ladder and its Metric Dimension Fixed Parameter Tractable Algorithms for Watchman Route Related Problems on Line Segment Arrangements Improved Approximate Dispersion Relation Analysis Using Deep Neural Network A key exchange protocol and a cryptosystem based on the generalized decomposition problem Real iterative algorithms for solving a complex matrix equation with two unknowns
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1