An unknown key-share attack on the MQV key agreement protocol
ACM Transactions on Information and System Security (TISSEC)
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Short Signatures from the Weil Pairing
Journal of Cryptology
An efficient biometrics-based remote user authentication scheme using smart cards
Journal of Network and Computer Applications
Cryptanalysis of Tso et al.'s ID-based tripartite authenticated key agreement protocol
ICISS'07 Proceedings of the 3rd international conference on Information systems security
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
Information Sciences: an International Journal
A secure dynamic identity based authentication protocol for multi-server architecture
Journal of Network and Computer Applications
Security weaknesses of authenticated key agreement protocols
Information Processing Letters
Modular security proofs for key agreement protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
New directions in cryptography
IEEE Transactions on Information Theory
Review: A survey of secure protocols in Mobile IPv6
Journal of Network and Computer Applications
Hi-index | 0.00 |
Key agreement allows multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. In the recent years, several identity-based (ID-based) authenticated key agreement protocols have been proposed and most of them broken. In this paper, we formalize the security model of ID-based authenticated tripartite key agreement protocol and propose a provably secure ID-based authenticated key agreement protocol for three parties with formal security proof under the computational Diffie-Hellman assumption. Experimental results by using the AVISPA tool show that the proposed protocol is secure against various malicious attacks.