Validation of Elliptic Curve Public Keys
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves
Proceedings of the 2005 ACM symposium on Applied computing
Secure off-the-record messaging
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
Information Sciences: an International Journal
The energy cost of cryptographic key establishment in wireless sensor networks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions
Computer Standards & Interfaces
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
Designs, Codes and Cryptography
A Provably Secure One-Pass Two-Party Key Establishment Protocol
Information Security and Cryptology
Comparing the Pre- and Post-specified Peer Models for Key Agreement
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Comparing the pre- and post-specified peer models for key agreement
International Journal of Applied Cryptography
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
A Framework for Authenticated Key Exchange in the Standard Model
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Strongly Secure Certificateless Key Agreement
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Multi-party off-the-record messaging
Proceedings of the 16th ACM conference on Computer and communications security
Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks
Wireless Personal Communications: An International Journal
Strongly Secure Authenticated Key Exchange without NAXOS' Approach
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
HPAKE: Password Authentication Secure against Cross-Site User Impersonation
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Reusing Static Keys in Key Agreement Protocols
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Secure access of smart cards using elliptic curve cryptosystems
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Authenticated key exchange and key encapsulation in the standard model
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Modeling leakage of ephemeral secrets in tripartite/group key exchange
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
A new security model for authenticated key agreement
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Modeling and analyzing security in the presence of compromising adversaries
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Okamoto-Tanaka revisited: fully authenticated diffie-hellman with minimal overhead
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Deniable internet key exchange
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
A secure and efficient authenticated Diffie-Hellman protocol
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
On reusing ephemeral keys in Diffie-Hellman key agreement protocols
International Journal of Applied Cryptography
Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Identity-based key exchange protocols without pairings
Transactions on computational science X
ProvSec'11 Proceedings of the 5th international conference on Provable security
Modeling key compromise impersonation attacks on group key exchange protocols
ACM Transactions on Information and System Security (TISSEC)
An improved two-party identity-based authenticated key agreement protocol using pairings
Journal of Computer and System Sciences
On the importance of public-key validation in the MQV and HMQV key agreement protocols
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Modular security proofs for key agreement protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
On the resilience of key agreement protocols to key compromise impersonation
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Practical strong designated verifier signature schemes based on double discrete logarithms
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
One-Way and two-party authenticated ID-Based key agreement protocols using pairing
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
HMQV: a high-performance secure diffie-hellman protocol
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
On robust key agreement based on public key authentication
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
A protocol for secure public instant messaging
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
A diffie-hellman key exchange protocol without random oracles
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Making the diffie-hellman protocol identity-based
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Provably secure tripartite password protected key exchange protocol based on elliptic curves
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Comments on the SM2 key exchange protocol
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
A provably secure authenticated key agreement protocol for wireless communications
Computers and Electrical Engineering
Configuration Tool for a Wireless Sensor Network Integrated Security Framework
Journal of Network and Systems Management
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
International Journal of Systems and Service-Oriented Engineering
Anonymity and one-way authentication in key exchange protocols
Designs, Codes and Cryptography
Exposure-resilient one-round tripartite key exchange without random oracles
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
A new trusted roaming protocol in wireless mesh networks
International Journal of Sensor Networks
An access authentication protocol for trusted handoff in wireless mesh networks
Computer Standards & Interfaces
Provably secure three-party authenticated key agreement protocol using smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
This paper proposes an efficient two-pass protocol for authenticated key agreement in the asymmetric (public-key) setting. The protocol is based on Diffie-Hellman key agreement and can be modified to work in an arbitrary finite group and, in particular, elliptic curve groups. Two modifications of this protocol are also presented: a one-pass authenticated key agreement protocol suitable for environments where only one entity is on-line, and a three-pass protocol in which key confirmation is additionally provided. Variants of these protocols have been standardized in IEEE P1363 [17], ANSI X9.42 [2], ANSI X9.63 [4] and ISO 15496-3 [18], and are currently under consideration for standardization and by the U.S. government's National Institute for Standards and Technology [30].