Hybrid - Key agreement protocol based on chebyshev polynomials
In cryptographic1system, two or more parties can
establish a session to share a key or be enable to the
exchange of secret values by a key-agreement
protocol. By this way, undesired third parties are not
allowed to see the key, so the agreed key is not
revealed to any eavesdropping party [1]. In general,
there is one party in a key exchange system generating
the key and then this key is distributed to other ones
using for encryption [2]. Key distribution often
consists of the master keys been lasting for long time
but used infrequently, and session keys for temporary
use between two parties. For those reasons, some sort
of mechanism or protocol are proposed to deliver the
secure session and master keys including a key
distribution center and public-key infrastructure (PKI)
[3]. In general, a public-key cryptosystem is applied to
encrypt secret keys for distribution and the authenticity
of the public key must be assured, several public key
exchange schemes are commonly used for symmetric
key agreement such as: RSA, Diffie-Hellman, Elliptic
Curve Diffie-Hellman [4]. However, the key exchange
based on public-key algorithms needs to the third party
which is a certificate authority such as X.509 standard
and each participant should have a public-key
infrastructure. Consequently, public-key
cryptographic systems inefficiently implement on low
resource requirements or mobile devices. Because of
the relatively high computational complexity of
asymmetric key algorithm, secret keys are distributed
by the public-key encryption leading to degrade
overall system performance. Typically, the secret keys
change frequently in each transaction, and then they
are discarded. It means that a public-key distributed
system is nearly ineffective in a wide-area distributed
system because of a number of secret keys supplied
dynamically. Therefore, the key distribution center is
one of flexible ways to deliver the secret keys. A
requirement for the use of KDCs is that KDCs be
trusted and prevented from destruction [5]. In addition,
the inverse problem of the discrete Chebyshev and the
classical discrete logarithm are the computational
complexity considered as equivalent. Authors in [6]
showed that Chebyshev polynomials in finite fields
fulfill cryptographic requirements and are also been
applied to design a public-key encryption scheme in
[7]–[9]. Moreover, Hue et al. in [10] presented a new
signcryption scheme based on the Chebyshev chaotic
map which is more efficient than elliptic curve-based
scheme with respect to required hardware resources.
The properties of Chebyshev polynomial in a finite
field are considered to enhance security. For instances,
authors proposed an efficient authentication protocol
in [11], the key agreement protocol with Chebyshev
polynomial sequences modulo a prime is introduced in
[12].
Trang 1
Trang 2
Trang 3
Trang 4
Trang 5
Trang 6
Trang 7
Tóm tắt nội dung tài liệu: Hybrid - Key agreement protocol based on chebyshev polynomials
𝐴 𝑚𝑚𝑚𝑚𝑚𝑚 𝑝𝑝 = >> 1; = 𝑛𝑛 ( ) (10) 8: = ( ) ; 𝑒𝑒 2 2 2 𝑒𝑒𝑖𝑖 9: end while𝑒𝑒 𝑒𝑒 From Eq.(𝐴𝐴 10),� an�𝐴𝐴 ��𝐴𝐴efficient���𝐴𝐴� algorithm for 10: Return𝐴𝐴 ; 𝐴𝐴 ∗ 𝐴𝐴 𝑚𝑚𝑚𝑚𝑚𝑚 𝑝𝑝 𝑖𝑖=0 𝑖𝑖 𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡 computing is described in Algorithm 1. By 11: end procedure this way, we 𝑒𝑒proposed the top-level implementation of 𝑅𝑅 the ( ) 𝐴𝐴 𝑚𝑚𝑚𝑚𝑚𝑚 , this𝑝𝑝 architecture represents in Fig.1. 𝑇𝑇𝑔𝑔 𝑥𝑥 𝑚𝑚𝑚𝑚𝑚𝑚 𝑝𝑝 Fig. 1. Hardware Architecture of 𝑇𝑇𝑔𝑔 52 Journal of Science & Technology 139 (2019) 050-056 A shift register _ with = 1, is a LSB of . Let us consider that = [ ] and = [ 𝐸𝐸 𝑟𝑟] 𝑟𝑟𝑟𝑟are the𝐸𝐸 coeffic𝑔𝑔 − ient𝑒𝑒 vectors 𝑣𝑣𝑣𝑣𝑣𝑣𝑣𝑣 1 0 corresponding𝐸𝐸 with respectively. 𝐴𝐴 According𝑎𝑎 𝑎𝑎to 𝑣𝑣𝑣𝑣𝑣𝑣𝑣𝑣 1 0 Algorithm𝑅𝑅 1, 𝑟𝑟the𝑟𝑟 equation the polynomial = + I and = + , = in step𝑒𝑒 5 is equivalent to ( + ) ( + 𝐴𝐴) = 1 0 1 0 𝑎𝑎 𝐴𝐴 𝑎𝑎 + ( 𝑅𝑅 +𝑟𝑟 𝐴𝐴 𝑟𝑟 𝐼𝐼) +𝑅𝑅 𝑅𝑅 ,∗ since𝐴𝐴 A2 = 1 0 1 0 2 2 1 = 2 ( 𝑎𝑎 𝐴𝐴+ 𝑎𝑎),𝐼𝐼 we∗ have𝑟𝑟 𝐴𝐴 R = 𝑟𝑟R𝐼𝐼 A = 1 1 1 0 0 1 0 0 (𝑎𝑎 𝑟𝑟 𝐴𝐴 + 𝐴𝐴 𝑎𝑎 𝑟𝑟+ 2 𝑎𝑎 ∗ 𝑟𝑟 ) 𝑎𝑎+ 𝑟𝑟( 𝐼𝐼 1 0 𝑥𝑥)𝑥𝑥. −The expression𝑥𝑥 𝑎𝑎 𝐴𝐴 is executed𝑎𝑎 𝐼𝐼 as following steps:∗ Fig. 2. Area of ASIC implementation Tg(x) mod p 𝑟𝑟0 ∗ 𝑎𝑎1 𝑟𝑟1 ∗ 𝑎𝑎0 𝑥𝑥 ∗ 𝑟𝑟1 ∗ 𝑎𝑎1 𝐴𝐴 𝑟𝑟0 ∗ 𝑎𝑎0 − 𝑟𝑟1 ∗ As can be seen in Fig.3, the mod-exp block 𝑎𝑎1 𝐼𝐼1) = >> 1, check the = [0, 1] undertakes calculating mod , the finite state 2) 𝐸𝐸 = 𝐸𝐸 , = 𝐿𝐿𝐿𝐿𝐿𝐿 𝑒𝑒 machine (FSM) block is used𝛼𝛼 to control′ the operation 𝑔𝑔 𝑝𝑝 3) 1 = 1 1+ 2 0+ 2 0 , 1 = of others. All benchmarks were executed on a kit 𝑡𝑡 𝑟𝑟 ∗ 𝑎𝑎 𝑡𝑡 𝑎𝑎 ∗ 𝑟𝑟 − 𝑡𝑡 FPGA Kintex KC705. Table 2 showed the 4) 𝑟𝑟Update1 𝑟𝑟0 ∗R 𝑎𝑎=1 R 𝑟𝑟A1 ∗and𝑎𝑎0 A = A𝑥𝑥 ∗ A𝑡𝑡1 𝑟𝑟0 𝑡𝑡2 performance of mod with several values of , , and . It is clear 𝛼𝛼that the more the bit length of and 5) E = 0, we obtain∗ ( ) = (2∗ + ) 𝑔𝑔 is, the slower𝑇𝑇 processing𝑝𝑝 speed and the more𝑥𝑥 𝑝𝑝 where registers , contain𝑇𝑇𝑔𝑔 𝑥𝑥 temporary𝑥𝑥 𝑥𝑥𝑟𝑟1 values𝑟𝑟0 − 𝑟𝑟of1 hardware𝑔𝑔 𝛼𝛼 resources are required. 𝑥𝑥 multiplication and addition. 𝑝𝑝 𝑡𝑡1 𝑡𝑡2 3. Hybrid-key Agreement Protocol In order to maximum security, and should be a large prime and a large integer, respectively [6]. In In this section, we proposed a Hybrid-Key this design, registers have the length𝑝𝑝 from𝑥𝑥 64 to 256 Agreement Protocol using the Chebyshev-based bits which storage the values of and , thus both public-key encryption, called HKAChev. A hybrid and are chosen in ranges [0, 264 − 1] and [0, 2256 − approach is both the use of a the chebyshev-based 1]. Authors in [12] indicated 𝑝𝑝that the𝑥𝑥 larger the𝑝𝑝 public-key encryption and the key distribution center iterative𝑥𝑥 coefficient is, the more the storage space of (KDC) to distribute the secret session keys between users. The proposed scheme is illustrated in Fig.4. ( ) is. Using the hardware platform on ASIC, Fig.2 Two elements including a security service and a shows the area of ASIC𝑔𝑔 implemention ( ) with the 𝑇𝑇𝑔𝑔 𝑥𝑥 Chebyshev-based key generation are embedded on bit length of is corresponding with 64,𝑔𝑔 80, 128, 192 each user’s devices. The first element, a security 𝑇𝑇 𝑥𝑥 and 256 bits. service buffers packets and transmits a connection- 𝑝𝑝 Assumed that = , we referred to the request packet. The second one, a Chebyshev based calculation problem ′ ( 𝛼𝛼) . However, the key generation is created by the Chebyshev 𝑔𝑔 ′ 𝑔𝑔 module mentioned in Section 2. In the hybrid-key value of increases 𝑔𝑔 rapidly according to α, so Algorithm 1′ will be ineffective,𝑇𝑇 𝑥𝑥 𝑚𝑚𝑚𝑚𝑚𝑚 it 𝑝𝑝should take more protocol,𝛼𝛼 the session key is considered as a temporary 𝑇𝑇𝑔𝑔 C.P.U time.𝑔𝑔 We proposed the hardware architecture of key and used for the communication between end- in Fig.3, this is an efficient way to calculate the user’s devices in a certain duration, and then discarded. Each session key is transmitted in Chebyshev𝛼𝛼 polynomials ( ) mod accurately. 𝑇𝑇𝑔𝑔 encryption form by Chebyshev-based public key This design is based on properties𝛼𝛼 of the permutation 𝑔𝑔 scheme, using a master key shared by the KDC. polynomial over the finite 𝑇𝑇field𝑥𝑥. 𝑝𝑝 3.1. Key Agreement Protocol based on Chebyshev The period of ( ) is 1 or + 1 map depending on the ′roots of the characteristic 𝑔𝑔 𝜶𝜶 𝑇𝑇 𝑥𝑥 𝑚𝑚𝑚𝑚𝑚𝑚 𝑝𝑝 𝑝𝑝 − 𝑝𝑝 𝒈𝒈 polynomial ( ) = 2 + 1, the period is Figure𝑻𝑻 4 shows our proposed protocol that retains 1 if the roots are 2are in GF(p), otherwise, +′ 1 KDC to share the stream of parameters containing a when the roots𝑓𝑓 λ are inλ GF(− 𝑥𝑥λ) [15]. By this way,𝑝𝑝 if master key. A Chebyshev-based public key scheme is 𝑝𝑝 − ( ) = ( ) = 1 then 2 = 1, else 𝑝𝑝= + applied to distribute the session key. 1. On the other hand, 𝑝𝑝 ′mod is equivalent′ to 𝑇𝑇𝑝𝑝−1 𝑥𝑥 𝑇𝑇0 𝑥𝑥 𝑝𝑝 𝑝𝑝 − 𝑝𝑝 𝑝𝑝 ( ) , instead′ of calculating , we 𝑇𝑇𝑔𝑔 𝑝𝑝 𝛼𝛼 ′ = 𝛼𝛼 determine𝑔𝑔 𝑚𝑚𝑚𝑚𝑚𝑚 𝑝𝑝 . 𝑇𝑇 ′𝑚𝑚𝑚𝑚𝑚𝑚 𝛼𝛼𝑝𝑝 ′ 𝑔𝑔 𝑔𝑔 𝑔𝑔 𝑚𝑚𝑚𝑚𝑚𝑚 𝑝𝑝 53 Journal of Science & Technology 139 (2019) 050-056 time session key and send that to User B by the steps below • Generating = ( ) mod , hence = 𝛼𝛼𝐴𝐴−(𝐾𝐾𝑀𝑀) mod . 𝐾𝐾𝑆𝑆𝑆𝑆 𝑇𝑇𝑔𝑔 𝑃𝑃𝑃𝑃𝐵𝐵 𝑝𝑝 𝛼𝛼𝐴𝐴+𝛼𝛼𝐵𝐵−𝐾𝐾𝑀𝑀 • Calculating𝐾𝐾𝑆𝑆𝑆𝑆 𝑇𝑇𝑔𝑔 = ( ,𝑥𝑥 ) and𝑝𝑝 = ( ) mod . 𝐶𝐶 𝐸𝐸 𝐾𝐾𝑆𝑆𝑆𝑆 𝐾𝐾𝑀𝑀 𝑆𝑆 𝛼𝛼𝐴𝐴−𝐾𝐾𝑀𝑀−𝐶𝐶 3) User𝑇𝑇 B𝑔𝑔 obtains (𝑥𝑥, ), the𝑝𝑝 following steps occur • Recovering = ( ) mod , hence Fig. 4. Hybrid-Key Agreement Protocol based on 𝑆𝑆 𝐶𝐶 = ( )𝛼𝛼 𝐵𝐵mod+𝐶𝐶 Chebyshev polynomials 𝐾𝐾′𝑆𝑆𝑆𝑆 𝑇𝑇𝑔𝑔 𝑆𝑆 𝑝𝑝 𝛼𝛼𝐴𝐴+𝛼𝛼𝐵𝐵−𝐾𝐾𝑀𝑀 Let us suppose that User A wishes to establish a • 𝐾𝐾Recovering′𝑆𝑆𝑆𝑆 𝑇𝑇𝑔𝑔 = 𝑥𝑥( , 𝑝𝑝) and if = connection with User B and encrypt messages by a then indicating′ ′ = as the ′one- 𝑀𝑀 𝑆𝑆𝑆𝑆 𝑀𝑀 one-time session key on that connection. User A can time session𝐾𝐾 key. 𝐷𝐷 𝐾𝐾 𝐶𝐶 𝐾𝐾 𝑀𝑀 𝑆𝑆𝑆𝑆 𝑆𝑆𝑆𝑆 issues a request with its identifier and a nonce 𝐾𝐾 𝐾𝐾′ 𝐾𝐾 4) The result is that both A and B know , which is given as a time stamp to identify this 𝐴𝐴 𝑖𝑖 therefore the session key can be used for transaction uniquely. User B sets 𝐼𝐼up𝐼𝐼 a transaction 𝑁𝑁to 𝑆𝑆𝑆𝑆 securely communicating between A and B. 𝐾𝐾Our KDC and sends the identifier of User B and 𝑆𝑆𝑆𝑆 proposed scheme provides 𝐾𝐾either confidentiality || . The KDC responds with the values of , , 𝐵𝐵 or authentication for exchanging the secret key. and = { || || } to both A𝐼𝐼 𝐼𝐼and B. 𝐴𝐴 𝐼𝐼 At the next session, both A and B discard and 𝐼𝐼Then𝐼𝐼 𝑁𝑁the following procedures are employed. 𝑥𝑥 𝑝𝑝 𝑀𝑀 𝐵𝐵 𝐴𝐴 𝑖𝑖 make deal with each other to exchange a new 𝑔𝑔 𝐾𝐾 ℎ𝑎𝑎𝑎𝑎ℎ 𝐼𝐼𝐼𝐼 𝐼𝐼𝐼𝐼 𝑁𝑁 𝑆𝑆𝑆𝑆 1) User B gets ( , , , ), calculating = session key. 𝐾𝐾 { || || } and checking that if ′= then 𝑀𝑀 𝑀𝑀 In Table 3, time required for the generation of a choosing a secret𝑥𝑥 𝑝𝑝 𝑔𝑔 key𝐾𝐾 and calculating′𝐾𝐾 ℎ 𝑎𝑎𝑎𝑎theℎ 𝐵𝐵 𝐴𝐴 𝑖𝑖 𝑀𝑀 𝑀𝑀 single key pair 128-bit symmetric with different 𝐼𝐼𝐼𝐼 𝐼𝐼𝐼𝐼 𝑁𝑁 ( ) 𝐾𝐾 𝐾𝐾 public key = mod . User B algorithms such as RSA, Diffie-Hellman (DH) and 𝛼𝛼𝐵𝐵 transmits to A. 𝛼𝛼𝐵𝐵 Elliptic curve Diffie-Hellman (EC) is shown in [1]. 𝑃𝑃𝑃𝑃𝐵𝐵 𝑇𝑇𝑔𝑔 𝑥𝑥 𝑝𝑝 The keys generated in HKAChev protocol are 64, 80, 2) User A selects𝑃𝑃𝑃𝑃𝐵𝐵 a random number as a secret key and receives . User A can generate a one- 128, 192 and 256 bit width. 𝛼𝛼𝐴𝐴 𝑃𝑃𝑃𝑃𝐵𝐵 α Fig. 3. Hardware Architecture of Tg Table 2. Hardware Resource Max Latency Max delay time Bit length of , , Bit length of Fmax(MHz) Flip-flops (cycle count) (ms) 64 𝑥𝑥 𝑝𝑝 𝑔𝑔 256 𝛼𝛼 217 79236 0.365 1488 80 256 193 122084 0.563 1792 128 256 150 305924 1.409 2704 192 256 141 680068 3.134 3920 256 256 136 1201668 5.538 5136 54 Journal of Science & Technology 139 (2019) 050-056 3.2. Security analysis combinations is 2 . It implies that the HKAChev protocol also withstands256 the replay attack. The Hybrid-Key Agreement protocol 𝛼𝛼𝐴𝐴 (HKAChev) depicted in Figure 4 ensures against an 4. Conclusion attacker who can control the intervening This paper has presented a Hybrid-Key communication between User A and B. In this case, an Agreement protocol (HKAChev) which possessed adversary, E, wants to compromise the both security attributes of public key based on the communication channel without being detected and Chebyshev polynomial and efficient exchanging key desires the session key. By eavesdropping, E can scheme of KDC. The proposed protocol achieved acquire a set of parameters involved ( || ) and knows desirable security levels resisting man-in-the middle, ( , , ). E has seen = ( ) replay and brute-force attacks. 𝛼𝛼 −𝑆𝑆𝐾𝐾 𝐶𝐶−𝐶𝐶 without known . One way to 𝑔𝑔break𝐴𝐴 𝑀𝑀 our proposed protocol,𝑥𝑥 𝑔𝑔 𝑝𝑝 E should be first𝑆𝑆 to exploit𝑇𝑇 and𝑥𝑥 𝑚𝑚𝑚𝑚𝑚𝑚 by𝑝𝑝 A model-based hardware design of the discrete 𝐴𝐴 solving both of 𝛼𝛼the equations = ( ) and Chebyshev polynomial in the prime field is illustrated. 𝐴𝐴 𝐵𝐵 = . If = ( ) 𝛼𝛼 then 𝛼𝛼 = These results show that the proposed structure 𝛼𝛼 𝛾𝛾 ( + 1) satisfied𝛽𝛽 𝑇𝑇 that𝑥𝑥 𝑚𝑚𝑚𝑚𝑚𝑚 𝑝𝑝1 and hardware requires a small resource and has more 𝛼𝛼 𝑔𝑔 𝛽𝛽 𝑇𝑇𝛼𝛼 𝑥𝑥 𝑚𝑚𝑚𝑚𝑚𝑚 𝑝𝑝 𝛼𝛼 effective performance. Thus, it is potential for 2 2 12 ( ) ( ) 𝑙𝑙𝑙𝑙𝑙𝑙𝑥𝑥+�𝑥𝑥 +must1 𝛽𝛽 be� in𝛽𝛽 the− field or √𝑥𝑥 − . To embedding in encryption applications. As an solve2 a square root in ( ) or ( ), it takes2 an exemplar, this hardware structure is applied to create a �𝛽𝛽 − 𝐺𝐺𝐺𝐺 𝑝𝑝 2 𝐺𝐺𝐺𝐺 𝑝𝑝 Chebyshev-based key generation in HKAChev expected running 𝐺𝐺𝐺𝐺time𝑝𝑝 of𝐺𝐺𝐺𝐺 𝑝𝑝 exp + protocol. Both the theoretical analysis and experimental results show that the proposed key (1) (ln( )) (ln(ln( ))) 𝑂𝑂 � 1.�92�𝜍𝜍 1 2 where in agreement protocol has a good security and potential 3 3 for implementing on limited hardware resources. 𝑂𝑂[6]. Besides,� 𝑛𝑛 the assumption𝑛𝑛 � that� E can get𝜍𝜍 the≅ value of , the discrete logarithm = ( ) has no Acknowledgments efficient solution. It means that it is infeasible to find This research is funded by Ministry of Science 𝛼𝛼 𝛾𝛾 𝑙𝑙𝑙𝑙𝑙𝑙𝑔𝑔 𝛼𝛼 from . Consequently, it is impossible to recover the and Technology (MOST) under grant number value of from ; In other words, no efficient 10/2018/TCT-KC.01/16-20. method𝛼𝛼 𝛽𝛽 for recovering the value of . The shared 𝐴𝐴 session key𝛼𝛼 is against𝑆𝑆 the man-in-middle attack. For References 𝑆𝑆𝑆𝑆 connection-oriented protocols, session𝐾𝐾 keys are [1]. W. Stallings, Cryptography and Network Security: exchanged frequently. Each nonce , we have only Principles and Practice, Upper Saddle River, NJ, USA: one , assumed that A wants to change and B is Prentice Hall Press, 6th ed., 2013. 𝑖𝑖 unaware of changes. A new session𝑁𝑁 key is created by 𝑀𝑀 𝑆𝑆𝑆𝑆 [2]. Dong Hwi Seo and P. Sweeney, Simple authenticated randomly𝐾𝐾 generating the value of . User𝐾𝐾 B received key agreement algorithm, Electronics Letters, vol. 35, and authenticated the new session key by itself without pp. 1073–1074, June 1999. 𝐴𝐴 going through KDC. As a result,𝛼𝛼 an efficient key [3]. P. E. Abi-Char, A. Mhamed, and B. El-Hassan, A exchange protocol is established by the HKAChev secure authenticated key agreement protocol based on one. elliptic curve cryptography, in Third International Table 3. Time required for the generation of a single Symposium on Information Assurance and Security, key pair 128-bit symmetric pp. 89–94, Aug 2007. [4]. C. Boyd and A. Mathuria, Key Agreement Protocols, RSA DH EC HKAChev pp. 137–199. Berlin, Heidelberg: Springer Berlin 900(ms) 51(ms) 0.53(ms) 0.7045(ms) Heidelberg, 2003. [5]. C. Adams, Kerberos Authentication Protocol, pp. 674– As a replay attack, the attacker E may intercept 675. Boston, MA: Springer US, 2011. when it is sent by User B in Step 1 and then will [6]. G. Maze, Algebraic methods for constructing one-way masquerade as User B next time. Since the attacker 𝐵𝐵 trapdoor functions. PhD thesis, University of Notre does𝑃𝑃𝑃𝑃 not know the secret key of each user neither Dame Notre Dame, 2003. or , E can not compute a correct || , E must try all 𝐴𝐴 [7]. L. Kocarev and S. Lian, Chaos-based Cryptography. possible values of . In this case, the or can 𝛼𝛼be 𝐵𝐵 Springer, 2011. run𝛼𝛼 with maximum 256 bits 𝑆𝑆long.𝐶𝐶 Thus, the 𝐴𝐴 𝐴𝐴 𝐵𝐵 computational complexity𝛼𝛼 to brute-force𝛼𝛼 all𝛼𝛼 possible [8]. S. Vairachilai, M. K. Kavithadevi, and R. Gnanajeyaraman, Public key cryptosystems using chebyshev polynomials based on edge information, in 55 Journal of Science & Technology 139 (2019) 050-056 2014 World Congress on Computing and [12]. G. J. Fee and M. B. Monagan, Cryptography using Communication Technologies, pp. 243–245, Feb chebyshev polynomials, in Laurier University, 2014. Waterloo, pp. 1–15, 2004. [9]. P. Bergamo, P. D’Arco, A. De Santis, and L. Kocarev, [13]. J. Liu, D. Yang, H. Zhou, and S. Chen, A digital image Security of public-key cryptosystems based on encryption algorithm based on bit-planes and an chebyshev polynomials, IEEE Transactions on improved logistic map, Multimedia Tools and Circuits and Systems I: Regular Papers, vol. 52, pp. Applications, p. 1, Nov. 2017. 1382–1393, July 2005. [14]. R. Bronson and G. B. Costa, 7 - matrix calculus, in [10]. T. T. K. Hue, T. M. Hoang, and A. Braeken, Matrix Methods (Third Edition) (R. Bronson and G. B. Lightweight signcryption scheme based on discrete Costa, eds.), pp. 213 – 255, Boston: Academic Press, chebyshev maps, in 2017 12th International third edition ed., 2009. Conference for Internet Technology and Secured Transactions (ICITST), pp. 43–47, Dec 2017. [15]. D. Yoshioka, Properties of chebyshev polynomials modulo p^k, IEEE Transactions on Circuits and [11]. A. Braeken, P. Kumar, M. Liyanage, and T. T. K. Hue, Systems II: Express Briefs, vol. 65, pp. 386–390, An efficient anonymous authentication protocol in March 2018. multiple server communication networks (eaam), The Journal of Supercomputing, vol. 74, pp. 1695– 1714, Apr 2018. 56
File đính kèm:
- hybrid_key_agreement_protocol_based_on_chebyshev_polynomials.pdf