Al-Riyami and Paterson’s Protocol Sample Clauses

Al-Riyami and Paterson’s Protocol. ‌ Al-Riyami and Paterson [1] introduced in their paper on certificateless public key cryp- tography a simple certificateless authenticated two-party key agreement protocol. The initialization of the protocol is formally specified using the algorithms of certificateless public key cryptography [1]. These include Setup, Partial-Private-Key-Extract, Set-Secret-Value, Set-Private-Key, and Set-Public Key. These algorithms are ex- plained in detail in Appendix A.1. Assume that entities A and B wish to agree on a secret key. They first each choose the random ephemeral values a, b ∈ Zq∗ as usual, and create the corresponding ephemeral public keys aP, bP ∈ G1 respectively. A then sends the ephemeral key TA = aP and A’s public key PA = ⟨XA, YA⟩ to B, who then in the same fashion responds with TB = bP and PB = ⟨XB, YB⟩ to A. Here, Xi = xiP and Yi = xiP0 = xisP, where xi is an entity’s long-term secret value and s is the KGC master key. A B a ∈ Z∗q TA, ⟨XA, YA⟩ b ∈ Z∗q → ê(XB, P0)? = ê(YB , P) −−−−−−−−−−−−− TB, ⟨XB, YB⟩ ê(XA, P0)? = ê(YA , P) KA = ê(QB , YB )a · ê(SA, TB) ←−−−−−−−−−−−−− KB = ê(QA , YA )b · ê(SB, TA) K = KA = KB = ê(SB, TA) · ê(SA, TB) FK = H(K abP) Figure 7: Al-Riyami and Paterson’s Protocol Once the messages are exchanged, both users verify that the same KGC master key has been used in each other’s public keys. A checks if ê(XB, P0) = ê(YB, P) and B checks if ê(XA, P0) = ê(YA, P). See that ê(xiP, sP) = ê(xisP, P) = ê(xiP, P)s. A then computes KA = ê(QB, YB)a · ê(SA, TB) and B computes KB = ê(QA, YA)b · ê(SB, TA), such that K = KA = KB becomes the shared key between A and B. Both entities then compute the → session key FK = H1(K abP) where H1 : G2 × G1 {0, 1}k. As pointed out by the authors, the protocol is vulnerable to a man-in-the-middle attack if the KGC replaces both the short-term and long-term public keys exchanged in a proto- col run. The reason only a KGC can mount such an attack is because the corresponding (partial) private key must be obtained in order to compute K. However, such an attack can be mounted on all certificateless schemes, and therefore it must be assumed that the KGC is trusted not to replace public keys. Note that the protocol may be weak against denial-of-service attacks as an adversary with no attachment to the KGC, may efficiently compute valid public keys simply by knowing (P, P0) and repeatedly query the victim to compute keys. For each key received, the victim will need to compute four pairings, and thus the computatio...
AutoNDA by SimpleDocs

Related to Al-Riyami and Paterson’s Protocol

  • COVID-19 Protocols Contractor will abide by all applicable COVID-19 protocols set forth in the District’s Reopening and COVID-19 Mitigation Plan and the safety guidelines for COVID-19 prevention established by the California Department of Public Health and the Ventura County Department of Public Health.

  • DEVELOPMENT OR ASSISTANCE IN DEVELOPMENT OF SPECIFICATIONS REQUIREMENTS/ STATEMENTS OF WORK Firms and/or individuals that assisted in the development or drafting of the specifications, requirements, statements of work, or solicitation documents contained herein are excluded from competing for this solicitation. This shall not be applicable to firms and/or individuals providing responses to a publicly posted Request for Information (RFI) associated with a solicitation.

  • Musculoskeletal Injury Prevention and Control (a) The Hospital in consultation with the Joint Health and Safety Committee (JHSC) shall develop, establish and put into effect, musculoskeletal prevention and control measures, procedures, practices and training for the health and safety of employees.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Reporting of Metered Data and Parameters 7.2.1 The grid connected Solar PV power plants will install necessary equipment for regular monitoring of solar irradiance (including GHI, DHI and solar radiation in the module plane), ambient air temperature, wind speed and other weather parameters and simultaneously for monitoring of the electric power (both DC and AC) generated from the Project.

  • NYS OFFICE OF INFORMATION TECHNOLOGY SERVICES NOTIFICATION All New York State Agencies must notify the Office of Information Technology Services of any and all plans to procure IT and IT -related products, materials and services meeting required thresholds defined in Technology Policy NYS–P08-001: xxxxx://xxx.xx.xxx/sites/default/files/documents/NYS-P08-001.pdf, as may be amended, modified or superseded. SALES REPORTING REQUIREMENTS Contractor shall furnish OGS with quarterly sales reports utilizing Appendix I - Report of Contract Sales. Purchases by Non- State Agencies, political subdivisions and others authorized by law shall be reported in the same report and indicated as required. All fields of information shall be accurate and complete. OGS reserves the right to unilaterally make revisions, changes and/or updates to Appendix I - Report of Contract Sales or to require sales to be reported in a different format without processing a formal amendment and/or modification. Further, additional related sales information and/or detailed Authorized User purchases may be required by OGS and must be supplied upon request. Reseller Sales Product sold through Reseller(s) must be reported by Contractor in the required Appendix I – Report of Contract Sales. Due Date The Appendix I - Report of Contract Sales will be quarterly (January - March, April - June, July - September and October - December). Reports will be due 1 month after the closing quarter. SERVICE REPORTS FOR MAINTENANCE/SUPPORT AND WARRANTY WORK Service Reports for Authorized User An Authorized User in an RFQ may require compliance with any or all of this section. If requested by the Authorized User, the Contractor shall furnish the Authorized User with service reports for all Maintenance/support and warranty work upon completion of the services. The service reports may include the following information in either electronic or hard copy form as designated by the Authorized User:  Date and time Contractor was notified  Date and time of Contractor’s arrival  Make and model of the Product  Description of malfunction reported by Authorized User  Diagnosis of failure and/or work performed by Contractor  Date and time failure was corrected by Contractor  Type of service – Maintenance/support or warranty  Charges, if any, for the service Service Reports for OGS

  • Placement of DNS probes Probes for measuring DNS parameters shall be placed as near as possible to the DNS resolvers on the networks with the most users across the different geographic regions; care shall be taken not to deploy probes behind high propagation-­‐delay links, such as satellite links.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Vendor Logo (Supplemental Vendor Information Only) No response Optional. If Vendor desires that their logo be displayed on their public TIPS profile for TIPS and TIPS Member viewing, Vendor may upload that logo at this location. These supplemental documents shall not be considered part of the TIPS Contract. Rather, they are Vendor Supplemental Information for marketing and informational purposes only. Bid Attributes Disadvantaged/Minority/Women Business & Federal HUBZone Some participating public entities are required to seek Disadvantaged/Minority/Women Business & Federal HUBZone ("D/M/WBE/Federal HUBZone") vendors. Does Vendor certify that their entity is a D/M/WBE/Federal HUBZone vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. NO Historically Underutilized Business (HUB) Some participating public entities are required to seek Historically Underutilized Business (HUB) vendors as defined by the Texas Comptroller of Public Accounts Statewide HUB Program. Does Vendor certify that their entity is a HUB vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. No National Coverage Can the Vendor provide its proposed goods and services to all 50 US States? Yes

  • Research, Science and Technology Cooperation 1. The aims of cooperation in research, science and technology, carried out in the mutual interest of the Parties and in compliance with their policies, will be: (a) to build on existing agreements already in place for cooperation on research, science and technology; (b) to encourage, where appropriate, government agencies, research institutions, universities, private companies and other research organizations in the Parties to conclude direct arrangements in support of cooperative activities, programs or projects within the framework of this Agreement, specially related to trade and commerce; and (c) to focus cooperative activities towards sectors where mutual and complementary interests exist, with special emphasis on information and communication technologies and software development to facilitate trade between the Parties. 2. The Parties will encourage and facilitate, as appropriate, the following activities including, but not limited to:

Time is Money Join Law Insider Premium to draft better contracts faster.