Two-Pass Authenticated Key Agreement Protocol with Key Confirmation

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 362
  • Download : 1093
DC FieldValueLanguage
dc.contributor.authorSong, Boyeonko
dc.contributor.authorKim, Kwangjoko
dc.date.accessioned2010-04-15T06:45:07Z-
dc.date.available2010-04-15T06:45:07Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2000-12-
dc.identifier.citationLECTURE NOTES IN COMPUTER SCIENCE, v.1977, no.58, pp.237 - 249-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10203/17755-
dc.description.abstractThis paper proposes three key agreement protocols that emphasize their security and performance. First, the two-pass authenticated key agreement (AK) protocol is presented in the asymmetric setting, which is based on Diffie-Hellman key agreement working over an elliptic curve group and provides more desirable security attributes than the MTI/A0, two-pass Unified Model and two-pass MQV protocols. Other two protocols are modifications of this protocol: the three-pass authenticated key agreement with key confirmation (AKC) protocol which uses message authentication code (MAC) algorithms for key confirmation, and the two-pass authenticated key agreement protocol with unilateral key confirmation which uses the MAC and the signature.-
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherSpringerlink-
dc.titleTwo-Pass Authenticated Key Agreement Protocol with Key Confirmation-
dc.typeArticle-
dc.type.rimsART-
dc.citation.volume1977-
dc.citation.issue58-
dc.citation.beginningpage237-
dc.citation.endingpage249-
dc.citation.publicationnameLECTURE NOTES IN COMPUTER SCIENCE-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorSong, Boyeon-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0