An Eecient Protocol for Authenticated Key Agreement 1 2

نویسندگان

  • Laurie Law
  • Alfred Menezes
  • Minghua Qu
  • Jerry Solinas
چکیده

This paper proposes a new and e cient two-pass protocol for authenticated key agreement in the asymmetric (public-key) setting. The protocol is based on Di e-Hellman key agreement and can be modi ed to work in an arbitrary nite group and, in particular, elliptic curve groups. Two modi cations of this protocol are also presented: a one-pass authenticated key agreement protocol suitable for environments where only one entity is on-line, and a three-pass protocol in which key con rmation is additionally provided. The protocols are currently under consideration for standardization in ANSI X9.42 [2], ANSI X9.63 [4] and IEEE P1363 [18].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provably Secure Password-authenticated Key Exchange Using Diie-hellman

When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow any information to be leaked that would allow veriication of the password (a weak shared key), since an attacker who obtains this information may be able to run an oo-line dictionary attack to determine the correct password. We...

متن کامل

On All - or - Nothing Transforms and Password - AuthenticatedKey

This thesis provides a formal analysis of two kinds of cryptographic objects that used to be treated with much less rigor: All-or-Nothing Transforms (AONTs) and Password-Authenticated Key Exchange protocols. For both, novel formal deenitions of security are given, and then practical and eecient constructions are proven secure. The constructions for password-authenticated key exchange are novel,...

متن کامل

Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy

For an identity-based authenticated key agreement (IDAK) protocol, PKG forward secrecy is the strongest notion of forward secrecy, which is about the security of previously established session keys after the master secret key of the Private Key Generatior (PKG) is compromised. In this paper, we put forward a new identity-based authenticated key agreement protocol which achieves PKG forward secr...

متن کامل

Comments on the Lu-Su Authenticated Key Agreement Scheme in Ad hoc Networks

Lu and Su [Comm. Of the CCISA 12(1) (2006) pp.93-104] proposed an authenticated key agreement scheme in Ad hoc Networks. Their scheme based on Shamir’s ID-based cryptosystem and Okamoto’s key distribution system attempts concurrently to achieve two goals: (1) any mobile node A can authenticate the other one B, who is communicating with A, is illegitimate node or not, and (2) A and B can obtain ...

متن کامل

Iot-1-pass-security: 1(one)-pass Authenticated Key Agreement Protocol for Energy Constraint Iot Applications

IoT data security is one of the core unresolved challenges in IoT community. Lack of resource-efficient authenticated secure key exchange methods among resourceconstrained IoT devices makes man-in-the-middle attacks a serious vulnerability. In this regard, we propose 1(One) pass Authenticated Key Agreement (AKA) protocol for IoT applications. This protocol requires only one round of communicati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998