An identity-based key-exchange protocol
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Integrating authentication in public key distribution system
Information Processing Letters
Strong password-only authenticated key exchange
ACM SIGCOMM Computer Communication Review
An unknown key-share attack on the MQV key agreement protocol
ACM Transactions on Information and System Security (TISSEC)
Robust generalized MQV key agreement protocol without using one-way hash functions
Computer Standards & Interfaces
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication
ISW '97 Proceedings of the First International Workshop on Information Security
Extended Password Key Exchange Protocols Immune to Dictionary Attacks
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants
The Computer Journal
Security proofs for signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Conference key distribution schemes for secure digital mobile communications
IEEE Journal on Selected Areas in Communications
Two improved two-party identity-based authenticated key agreement protocols
Computer Standards & Interfaces
An efficient dynamic group key agreement protocol for imbalanced wireless networks
International Journal of Network Management
Two ID-based authenticated schemes with key agreement for mobile environments
The Journal of Supercomputing
Hi-index | 0.02 |
A key exchange (or agreement) protocol is designed to allow two entities establishing a session key to encrypt the communication data over an open network. In 1990, Gunther proposed an identity-based key exchange protocol based on the difficulty of computing a discrete logarithm problem. Afterwards, several improved protocols were proposed to reduce the number of communication steps and the communicational cost required by Gunther's protocol. This paper presents an efficient identity-based key exchange protocol based on the difficulty of computing a discrete logarithm problem. As compared with the previously proposed protocols, it has better performance in terms of the computational cost and the communication steps. The proposed key exchange protocol provides implicit key authentication as well as the desired security attributes of an authenticated key exchange protocol.