Back to Search Start Over

Three Party Key Sharing Protocol Using Polynomial Rings

Authors :
Manoi Kumar Misra
Varun Shukla
Atul Chaturvedi
Source :
2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON).
Publication Year :
2018
Publisher :
IEEE, 2018.

Abstract

All of us know that authentication and key agreement are the two cryptographic services very important for data communication. People use online methods for information exchange using various wireless communication channels. Intruders want to steal sensitive useful information and they use different cryptanalysis ways for that. Quantum computing methods also produces danger for all the existing protocols and algorithms. So at this point of time, it is essential that researchers find new and innovative protocols for data communication in order to surprise intruders. In this paper we present three party key sharing protocol and its correctness involving polynomial rings.

Details

Database :
OpenAIRE
Journal :
2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)
Accession number :
edsair.doi...........6c02f36a589ed83761b71cdbb4cbd24b
Full Text :
https://doi.org/10.1109/upcon.2018.8596905