{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T09:27:10Z","timestamp":1673342830957},"reference-count":34,"publisher":"World Scientific Pub Co Pte Lt","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2019,6]]},"abstract":"<jats:p> Most of the existing cryptographic schemes, e.g., key agreement protocol, call for good randomness. Otherwise, the security of these cryptographic schemes cannot be fully guaranteed. Nonce-based cryptosystem is recently introduced to improve the security of public key encryption and digital signature schemes by ensuring security when randomness fails. In this paper, we first investigate the security of key agreement protocols when randomness fails. Then we define the security model for nonce-based key agreement protocols and propose a nonce-based key agreement protocol that protects against bad randomness. The new protocol is proven to be secure in our proposed security model. <\/jats:p>","DOI":"10.1142\/s0129054119400161","type":"journal-article","created":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T20:51:21Z","timestamp":1562100681000},"page":"619-633","source":"Crossref","is-referenced-by-count":2,"title":["Nonce-Based Key Agreement Protocol Against Bad Randomness"],"prefix":"10.1142","volume":"30","author":[{"given":"Burong","family":"Kang","sequence":"first","affiliation":[{"name":"School of Computer Science and Software Engineering, East China Normal University, Shanghai 200062, P. R. China"}]},{"given":"Xinyu","family":"Meng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Software Engineering, East China Normal University, Shanghai 200062, P. R. China"}]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Software Engineering, East China Normal University, Shanghai 200062, P. R. China"}]},{"given":"Yinxia","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Nanjing Normal University, Nanjing 210097, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"S0129054119400161BIB002","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_25"},{"key":"S0129054119400161BIB003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_28"},{"key":"S0129054119400161BIB005","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63697-9_16"},{"key":"S0129054119400161BIB006","first-page":"259","volume-title":"Int. Conf. Information Systems Security and Privacy","author":"Buttner C.","year":"2016"},{"key":"S0129054119400161BIB007","first-page":"319","volume-title":"USENIX Security Symposium","author":"Checkoway S.","year":"2014"},{"key":"S0129054119400161BIB008","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"S0129054119400161BIB009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_5"},{"key":"S0129054119400161BIB010","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.060598"},{"key":"S0129054119400161BIB011","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.012"},{"key":"S0129054119400161BIB012","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.42"},{"key":"S0129054119400161BIB013","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76578-5_9"},{"key":"S0129054119400161BIB015","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_30"},{"issue":"2","key":"S0129054119400161BIB016","first-page":"263","volume":"18","author":"Kumar A.","year":"2016","journal-title":"Int. J. Netw. Sec."},{"key":"S0129054119400161BIB017","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.056"},{"key":"S0129054119400161BIB018","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2662216"},{"key":"S0129054119400161BIB019","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.06.003"},{"key":"S0129054119400161BIB020","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.017"},{"key":"S0129054119400161BIB021","doi-asserted-by":"publisher","DOI":"10.1007\/11526018_13"},{"key":"S0129054119400161BIB023","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586125"},{"key":"S0129054119400161BIB024","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_22"},{"key":"S0129054119400161BIB025","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_23"},{"key":"S0129054119400161BIB026","first-page":"26","volume-title":"Symp. Cryptography and Information Security","author":"Sakai R.","year":"2000"},{"key":"S0129054119400161BIB028","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.009"},{"key":"S0129054119400161BIB029","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2759329"},{"key":"S0129054119400161BIB030","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2841047"},{"key":"S0129054119400161BIB031","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2730479"},{"key":"S0129054119400161BIB032","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.09.022"},{"key":"S0129054119400161BIB033","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2485225"},{"key":"S0129054119400161BIB035","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2579162"},{"key":"S0129054119400161BIB036","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2447933"},{"key":"S0129054119400161BIB037","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2038222"},{"key":"S0129054119400161BIB038","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2480004"},{"key":"S0129054119400161BIB039","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.06088"},{"key":"S0129054119400161BIB040","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.11.036"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054119400161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T15:26:08Z","timestamp":1565105168000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054119400161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":34,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2019,7,2]]},"published-print":{"date-parts":[[2019,6]]}},"alternative-id":["10.1142\/S0129054119400161"],"URL":"https:\/\/doi.org\/10.1142\/s0129054119400161","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"value":"0129-0541","type":"print"},{"value":"1793-6373","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6]]}}}