Back to Search
Start Over
Three Party Key Sharing Protocol Using Polynomial Rings
- Source :
- 2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON).
- Publication Year :
- 2018
- Publisher :
- IEEE, 2018.
-
Abstract
- All of us know that authentication and key agreement are the two cryptographic services very important for data communication. People use online methods for information exchange using various wireless communication channels. Intruders want to steal sensitive useful information and they use different cryptanalysis ways for that. Quantum computing methods also produces danger for all the existing protocols and algorithms. So at this point of time, it is essential that researchers find new and innovative protocols for data communication in order to surprise intruders. In this paper we present three party key sharing protocol and its correctness involving polynomial rings.
Details
- Database :
- OpenAIRE
- Journal :
- 2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)
- Accession number :
- edsair.doi...........6c02f36a589ed83761b71cdbb4cbd24b
- Full Text :
- https://doi.org/10.1109/upcon.2018.8596905