Live Breaking News & Updates on Key Exchange Protocol

Stay updated with breaking news from Key exchange protocol. Get real-time updates on events, politics, business, and more. Visit us for reliable news and exclusive interviews.

"ACKE: Asymmetric Computing Key Exchange Protocol for IoT Environments" by Houzhen Wang, Jiaming Wen et al.

Most of the cryptographic protocols currently in use are not appropriate for Internet of Things (IoT) environments because of their huge computing overhead, especially for terminal-embedded devices with resource constrained. Moreover, the computing resources in IoT environments are frequently asymmetric, that is to say, the computing power of the terminal devices is always weak and the server side is relatively stronger. In order to guarantee the security in the scenario, we present the asymmetric computing cryptosystem. Take the key exchange protocol as an example, we show how to construct ACKE, an asymmetric computing key exchange protocol, by employing the Diffie-Hellman key exchange protocol and the Subset Product problem (NP-complete) in this article. The underlying idea this construction is to significantly decrease the computational complexity of one party, and allow for a suitable rise in the computational complexity of another party. Our proposed protocol is implemented on an ....

Subset Product , Asymmetric Computing Resources , Nternet Of Things Iot Security , Key Exchange Protocol , Odular Exponentiation , Secure Outsourcing ,