System, method and computer program product for authenticating a data agreement between network entities

作者: Kaisa Nyberg , Nadarajah Asokan

DOI:

关键词: Product (mathematics)Data miningComputer scienceAgreementString (computer science)Computer programValue (computer science)Data value

摘要: A method for authenticating a data agreement between first and second network entities can include the entity committing to agreed value, transmitting committed value random entity. The receive then open such that check value. If successful, calculate third string, similarly fourth based upon values. string without comparing strings be considered authenticated comparison.

参考文章(29)
Donald B. Johnson, Alfred Menezes, Simon Blake-Wilson, Authenticated key agreement protocol ,(1998)
Martin E. Hellman, Bailey W. Diffie, Ralph C. Merkle, Cryptographic apparatus and method ,(1977)
Mohammad Peyravian, Clark Debs Jeffries, Efficient method for providing secure remote access ,(2003)
Jeffrey Hoffstein, Yiqun Lisa Yin, Burton S. Kaliski, Daniel Bennett Lieman, Matthew John Barton Robshaw, Secure user identification based on constrained polynomials ,(1997)