Conferences related to Key

Back to Top

2020 IEEE International Symposium on Antennas and Propagation and North American Radio Science Meeting

The joint meeting is intended to provide an international forum for the exchange of information on state of the art research in the area of antennas and propagation, electromagnetic engineering and radio science


2020 IEEE Applied Power Electronics Conference and Exposition (APEC)

APEC focuses on the practical and applied aspects of the power electronics business. Not just a power designer’s conference, APEC has something of interest for anyone involved in power electronics including:- Equipment OEMs that use power supplies and converters in their equipment- Designers of power supplies, dc-dc converters, motor drives, uninterruptable power supplies, inverters and any other power electronic circuits, equipments and systems- Manufacturers and suppliers of components and assemblies used in power electronics- Manufacturing, quality and test engineers involved with power electronics equipment- Marketing, sales and anyone involved in the business of power electronic- Compliance engineers testing and qualifying power electronics equipment or equipment that uses power electronics


2020 IEEE International Conference on Plasma Science (ICOPS)

IEEE International Conference on Plasma Science (ICOPS) is an annual conference coordinated by the Plasma Science and Application Committee (PSAC) of the IEEE Nuclear & Plasma Sciences Society.


2020 Optical Fiber Communications Conference and Exhibition (OFC)

The Optical Fiber Communication Conference and Exhibition (OFC) is the largest global conference and exhibition for optical communications and networking professionals. For over 40 years, OFC has drawn attendees from all corners of the globe to meet and greet, teach and learn, make connections and move business forward.OFC attracts the biggest names in the field, offers key networking and partnering opportunities, and provides insights and inspiration on the major trends and technology advances affecting the industry. From technical presentations to the latest market trends and predictions, OFC is a one-stop-shop.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


More Conferences

Periodicals related to Key

Back to Top

Antennas and Propagation, IEEE Transactions on

Experimental and theoretical advances in antennas including design and development, and in the propagation of electromagnetic waves including scattering, diffraction and interaction with continuous media; and applications pertinent to antennas and propagation, such as remote sensing, applied optics, and millimeter and submillimeter wave techniques.


Applied Superconductivity, IEEE Transactions on

Contains articles on the applications and other relevant technology. Electronic applications include analog and digital circuits employing thin films and active devices such as Josephson junctions. Power applications include magnet design as well asmotors, generators, and power transmission


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


More Periodicals

Most published Xplore authors for Key

Back to Top

Xplore Articles related to Key

Back to Top

Proficient key management scheme for multicast groups using group key agreement and broadcast encryption

2017 International Conference on Information Communication and Embedded Systems (ICICES), 2017

Key Management techniques are exercised to distribute and update keys such that illegitimate parties cannot ingress group communications. Key management, however can exhibit information about the stream of group association, such as group size and the number of joining and leaving users. This is a threat to applications with confidential group membership information. This project proposes a new key management ...


Secure and Efficient Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme

2009 Fifth International Joint Conference on INC, IMS and IDC, 2009

As the fundamental building block for secure communication in the open network, authenticated key agreement protocols are usually constructed in the public key setting. Certificateless public key cryptography combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In this paper, we present a secure and efficient two-party authenticated key agreement protocol based on the efficient ...


A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow

2009 Fifth International Conference on Information Assurance and Security, 2009

Key agreement protocols are essential for secure communications in open and distributed environments. Identity-based cryptography has become extremely fashionable in the last few years for its special advantages. In this paper, we point out some flaw in the scheme proposed by Wang et al., then we present a two-party identity-based explicit authenticated key agreement protocol with key confirmation, which was ...


Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme

2009 International Conference on Management of e-Commerce and e-Government, 2009

Authenticated key agreement protocol is the fundamental building block for secure communication in the open network to ensure authentication and confidentiality of e-commerce and e-government applications. Certificateless public key cryptography combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In this paper, we present a secure and efficient two-party authenticated key agreement protocol based on ...


Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol

2009 Asia-Pacific Conference on Information Processing, 2009

Authenticated key agreement protocol is crucial in providing data confidentiality and integrity to subsequent communications among two or more parties over a public network. Certificateless public key cryptography (CL- PKC) combines the advantage of the identity-based public key cryptography (ID- PKC) and the traditional PKI. In 2007, Y.J Shi and J.H Li proposed a two-party authenticated key agreement protocol based ...


More Xplore Articles

Educational Resources on Key

Back to Top

IEEE-USA E-Books

  • Proficient key management scheme for multicast groups using group key agreement and broadcast encryption

    Key Management techniques are exercised to distribute and update keys such that illegitimate parties cannot ingress group communications. Key management, however can exhibit information about the stream of group association, such as group size and the number of joining and leaving users. This is a threat to applications with confidential group membership information. This project proposes a new key management paradigm which a combination of traditional broadcast encryption and group key agreement which never reveals the group dynamic information to outsiders and achieves both forward secrecy and backward secrecy. It provides a secure key management model not only with public and private key but also two more keys called group key and session key. It is distributed to multiple user overtime. It also overcomes the limitation of quantum point to point key sharing. It offers reliability and convenience of use, as well as to introduce a secure and efficient key management technique for any quantum cryptography network in real time.

  • Secure and Efficient Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme

    As the fundamental building block for secure communication in the open network, authenticated key agreement protocols are usually constructed in the public key setting. Certificateless public key cryptography combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In this paper, we present a secure and efficient two-party authenticated key agreement protocol based on the efficient certificateless public key encryption scheme due to Cheng and Comley. Security analysis shows that it achieves perfect forward secrecy, PKG forward secrecy and almost all the other known security attributes for authenticated key agreement protocol, such as known-key secrecy, key-compromise impersonation resilience, unknown key-share resilience, known session-specific temporary information security, message independence and no key control. Compared to other comparable schemes, it is more secure and has nice efficiency.

  • A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow

    Key agreement protocols are essential for secure communications in open and distributed environments. Identity-based cryptography has become extremely fashionable in the last few years for its special advantages. In this paper, we point out some flaw in the scheme proposed by Wang et al., then we present a two-party identity-based explicit authenticated key agreement protocol with key confirmation, which was inspired on a new identity-based encryption scheme first proposed by Gentry and can be used properly in the escrowless mode. The scheme captures the attributes of known-key secrecy, key-compromise impersonation resilience, unknown key-share resilience, perfect forward secrecy, and no-key control. Especially, the scheme captures the PKG forward secrecy property. The PKG still could not recover all the userspsila past session keys even he knows the long-term private keys of all users.

  • Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme

    Authenticated key agreement protocol is the fundamental building block for secure communication in the open network to ensure authentication and confidentiality of e-commerce and e-government applications. Certificateless public key cryptography combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In this paper, we present a secure and efficient two-party authenticated key agreement protocol based on an efficient and secure certificateless public key encryption scheme. It achieves almost all the known security attributes for authenticated key agreement protocol, such as perfect forward secrecy, PKG forward secrecy, key- compromise impersonation resilience, unknown key-share resilience, message independence and no key control. Compared to other comparable schemes, it is more secure and has nice efficiency.

  • Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol

    Authenticated key agreement protocol is crucial in providing data confidentiality and integrity to subsequent communications among two or more parties over a public network. Certificateless public key cryptography (CL- PKC) combines the advantage of the identity-based public key cryptography (ID- PKC) and the traditional PKI. In 2007, Y.J Shi and J.H Li proposed a two-party authenticated key agreement protocol based on the certificateless encryption scheme proposed by B. Libert and J.J. Quisquater. It is found that the scheme is vulnerable to the key replicating attack (one form of the man-in-the-middle attack), so it doesnpsilat possess the security attribute of implicit key authentication and key control. We analyze such an attack of this protocol in the BR93 model in detail, and demonstrate that the protocol is not secure if the adversary is allowed to send a reveal query to reveal non-partner players who had accepted the same session key.

  • Key-Compromise Impersonation Attacks on Some Certificateless Key Agreement Protocols and Two Improved Protocols

    Certificateless public key cryptography (CL-PKC) is a new paradigm in public key cryptography which avoids the inherent key escrow problem of identity- based public key cryptography (ID-PKC) and yet requires no certificates to guarantee the authenticity of users' public keys. It was first introduced by Al-Riyami and Paterson in 2003. Subsequently, several certificateless two- party key agreement protocols were presented. Unfortunately, some of these protocols are not as secure as they were claimed to be. We will show that some existing certificateless key agreement protocols do not satisfy the requirements of key-compromise impersonation security and known session- specific temporary information security. Further more, we present two improved certificateless authenticated two-party key agreement protocols which possess all security attributes of a key agreement protocol.

  • Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications

    Modern collaborative and group-oriented applications typically involve communications over open networks. Given the openness of today's networks, communications among group members must be secure and, at the same time, efficient. Group key agreement (GKA) is widely employed for secure group communications in modern collaborative and group-oriented applications. This paper studies the problem of GKA in identity-based cryptosystems with an emphasis on round-efficient, sender-unrestricted, member-dynamic, and provably secure key escrow freeness. The problem is resolved by proposing a one-round dynamic asymmetric GKA protocol which allows a group of members to dynamically establish a public group encryption key, while each member has a different secret decryption key in an identity-based cryptosystem. Knowing the group encryption key, any entity can encrypt to the group members so that only the members can decrypt. We construct this protocol with a strongly unforgeable stateful identity-based batch multisignature scheme. The proposed protocol is shown to be secure under the k -bilinear Diffie-Hellman exponent assumption.

  • Certificateless non-interactive key exchange protocol without pairings

    Non-interactive key exchange (NIKE) allows two parties to establish a shared key without communications. In ID-based non-interactive key exchange (ID-NIKE) protocols, private key generator (PKG) knows user's private key, so it can calculate the shared key between two participants, and most constructions of ID-NIKE need expensive pairing operation. To overcome these disadvantages, a security model of certificateless non-interactive key exchange (CL-NIKE) is proposed in this paper. And a scheme without pairings is also given. The proposed protocol is proved secure in the Random Oracle Model (ROM) based on the gap Diffie-Hellman (GDH) and computational Diffie-Hellman (CDH) problem. In the new protocol, key generation center (KGC) only knows user's partial key and is not able to calculate the shared key. Moreover, the new protocol is more efficient than the existing ID-NIKE schemes because it is pairing-free.

  • Multi-matrix combined public key based on big data system key management scheme

    With the advent of the era of big data, Large-scale data is stored in the cloud, and data security and privacy become more and more important. Key management, as an important part of big data security mechanism, faces the problem of scale demand. A multi-matrix combined public key based big data system key management scheme is proposed in this paper. Key matrix is divided into several little matrixes according to the identity of user, which can resist collusion attack. Key distribution, key updating and key agreement is designed thoroughly. Through security analysis and performance analysis, we can conclude that multi-matrix combined public key based big data system key management scheme has many remarkable characteristics such as high efficiency and security.

  • Robust distributed key issuing protocol for identity based cryptography

    In this paper, we propose a robust distributed threshold key transfer protocol or issuing protocol that solves the key escrow problem in identity-based approach. We use threshold cryptographic techniques in each phase of the algorithm such as in system public key setup, key issuing, key securing and private key reconstruction. Our protocol is robust means even t KPA's (out of n = 21 + 1) are corrupted or dishonest the user recover the private key. This protocol can be efficient even if the communication between authorities (KGC and KPAs) is insecure. This approach is useful and offer benefits that are in identity-based techniques, while eliminating key escrow from the setup. In this protocol, either KGC or KPA cannot cheat the users to obtain their private keys. Security analysis of proposed protocol and active adversary assumptions are also presented.



Standards related to Key

Back to Top

IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.