Authenticated multiple key exchange protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In this paper, we propose an identity-based multiple key exchange protocol. The authentication part of the
Integrating identity-based and certificate-based authenticated key exchange protocols
✍ Scribed by Berkant Ustaoğlu
- Publisher
- Springer-Verlag
- Year
- 2011
- Tongue
- English
- Weight
- 241 KB
- Volume
- 10
- Category
- Article
- ISSN
- 1615-5262
No coin nor oath required. For personal study only.
📜 SIMILAR VOLUMES
In this paper, we present a strongly secure identity-based (ID-based) two-party authenticated key agreement (AKA) protocol, which captures all basic desirable security properties including master key forward secrecy, ephemeral secrets reveal resistance and so on, and is provably secure in the extend
Lee et al. [4] proposed two new authenticated multiple key exchange protocols based on Elliptic Curve Cryptography (ECC) and bilinear pairings. In this paper, we show an impersonation attack on their pairing-based authenticated key exchange protocol. We demonstrate that any attacker can impersonate