The GN-authenticated key agreement
نویسندگان
چکیده
In this paper the authors present two protocols for the common key establishment. The first protocol, which has two steps, assures the authentication of the common agreement key. The second one is a three-pass authenticated agreement key protocol and it contains a step for the key confirmation. The security of both protocols results from the elliptic curve discrete logarithm problem and their security proof follows from some well known definitions. Also, the attack discussion of elliptic curve discrete logarithm problem is presented. 2005 Elsevier Inc. All rights reserved.
منابع مشابه
ID-based tripartite Authenticated Key Agreement Protocols from pairings
This paper proposes ID-based tripartite authenticated key agreement protocols. The authenticated three party key agreement protocols from pairings [15], and the ID-based two party authenticated key agreement protocol [13] are studied. These two protocols are taken as the basis for designing three new ID-based tripartite authenticated key agreement protocols. The security properties of all these...
متن کاملWeakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols
Key agreement allows multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. In recent years, several identity-based authenticated key agreement protocols have been proposed. In this study, we analyze three identity-based tripartite authenticated key agreement protocols. After the analysis, we found that these prot...
متن کاملAn Improved ID-based Authenticated Group Key Agreement Scheme
Xinjun Du, Ying Wang, Jianhua Ge and Yumin Wang Key Laboratory of Computer Networks and Information Security Xidian University Xi’an 710071, P.R. China Abstract. Authenticated group key agreement problem is important in many modern collaborative and distributed applications. There are two ID-based authenticated group key agreement schemes have been proposed by Choi et al. and us, which are base...
متن کاملA New Authenticated Key Agreement Protocol
Authenticated key agreement protocols play a significant role in securing communications over public network channels (Internet). This paper proposes a new key agreement protocol based on factorization problem over nonabelian groups. Then it presents two different ways to provide mutual authentication for the proposed protocol; this paper presents a new authenticated key agreement protocol usin...
متن کاملA Robust Authenticated Key Agreement Protocol
In this paper, we propose a robust authenticated key agreement protocol in which two communication parties exchange a secret session key and authenticate each other. The protocol can be considered as an improvement of simple authenticated key agreement algorithm (SAKA). However, our protocol is more significant in that it addresses the problem of the off-line password guessing attack.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Applied Mathematics and Computation
دوره 170 شماره
صفحات -
تاریخ انتشار 2005