Several practical protocols for authentication and key exchange

  • Authors:
  • Chae Hoon Lim;Pil Joong Lee

  • Affiliations:
  • -;-

  • Venue:
  • Information Processing Letters
  • Year:
  • 1995

Quantified Score

Hi-index 0.89

Visualization

Abstract

It is often desirable to achieve mutual authentication and secret key exchange in the same protocol. Two kinds of approaches may be considered for this purpose: authentication after key exchange using symmetric algorithms and Diffie-Hellman-type key exchange protocols, and key exchange after authentication by modifying 3-move identification schemes based on zero-knowledge technique. This letter presents several such protocols by each approach.