Two-Pass Authenticated Key Agreement Protocol with Key Confirmation

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 348
  • Download : 1091
This paper proposes three key agreement protocols that emphasize their security and performance. First, the two-pass authenticated key agreement (AK) protocol is presented in the asymmetric setting, which is based on Diffie-Hellman key agreement working over an elliptic curve group and provides more desirable security attributes than the MTI/A0, two-pass Unified Model and two-pass MQV protocols. Other two protocols are modifications of this protocol: the three-pass authenticated key agreement with key confirmation (AKC) protocol which uses message authentication code (MAC) algorithms for key confirmation, and the two-pass authenticated key agreement protocol with unilateral key confirmation which uses the MAC and the signature.
Publisher
Springerlink
Issue Date
2000-12
Language
English
Citation

LECTURE NOTES IN COMPUTER SCIENCE, v.1977, no.58, pp.237 - 249

ISSN
0302-9743
URI
http://hdl.handle.net/10203/17755
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0