Authenticated multiple key exchange protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In this paper, we propose an identity-based multiple key exchange protocol. The authentication part of the
โฆ LIBER โฆ
Several practical protocols for authentication and key exchange
โ Scribed by Chae Hoon Lim; Pil Joong Lee
- Publisher
- Elsevier Science
- Year
- 1995
- Tongue
- English
- Weight
- 435 KB
- Volume
- 53
- Category
- Article
- ISSN
- 0020-0190
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Efficient identity-based authenticated m
โ
Zuowen Tan
๐
Article
๐
2011
๐
Elsevier Science
๐
English
โ 226 KB
Analysis and improvement of an authentic
โ
Qingfeng Cheng; Chuangui Ma
๐
Article
๐
2011
๐
Elsevier Science
๐
English
โ 174 KB
Communication-efficient three-party prot
โ
Tian-Fu Lee; Jenn-Long Liu; Mei-Jiun Sung; Shiueng-Bien Yang; Chia-Mei Chen
๐
Article
๐
2009
๐
Elsevier Science
๐
English
โ 880 KB
Enhancements of authenticated multiple k
โ
Duc-Liem Vo; Hyunrok Lee; Chan-Yeob Yeun; Kwangjo Kim
๐
Article
๐
2010
๐
Elsevier Science
๐
English
โ 160 KB
Lee et al. [4] proposed two new authenticated multiple key exchange protocols based on Elliptic Curve Cryptography (ECC) and bilinear pairings. In this paper, we show an impersonation attack on their pairing-based authenticated key exchange protocol. We demonstrate that any attacker can impersonate
A new mutual authentication and key exch
โ
Yang, Chou-Chen ;Li, Jian-Wei ;Hwang, Min-Shiang
๐
Article
๐
2004
๐
John Wiley and Sons
๐
English
โ 109 KB
๐ 1 views
Enhancement of two-factor authenticated
โ
Yunho Lee; Seungjoo Kim; Dongho Won
๐
Article
๐
2010
๐
Elsevier Science
๐
English
โ 816 KB