Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A new key authentication scheme based on discrete logarithms
Applied Mathematics and Computation
Security Enhancement for the "Simple Authentication Key Agreement Algorithm"
COMPSAC '00 24th International Computer Software and Applications Conference
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Pricing via Processing or Combatting Junk Mail
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Authenticated Multi-Party Key Agreement
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A Formal Framework and Evaluation Method for Network Denial of Service
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
New directions in cryptography
IEEE Transactions on Information Theory
Review: TCP/IP security threats and attack methods
Computer Communications
Hi-index | 0.00 |
The denial-of-service attack, a malicious client executes a key agreement protocol simultaneously many times to exhaust the server's memory or computing resource and to interfere the honest client connecting with the server. It is a serious problem in the key agreement protocol. A key agreement protocol which resists to the storage-exhaustion and the CPU-exhaustion attack was firstly proposed by Hiros-Matsuura. However, their protocol is not efficient enough during the weak key validation. Our proposed protocol modifies the weak key validation and avoids the unnecessary heavy computation to enhance the resistance of the denial-of-service attack. The most important contributions of our protocol are not only efficiently to resist CPU-exhaustion and memory-exhaustion attacks but also prevent bandwidth consumption.