2008
DOI: 10.1007/978-3-540-79549-0_15
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves

Abstract: Key agreement protocol is of fundamental importance in providing data confidentiality and integrity between two or more parties over an insecure network. In 2004, Popescu [14] proposed an authenticated key agreement protocol in which its security is claimed. However, Yoon and Yoo [19] discovered its vulnerabilities two years later and proposed an improved variant of it. In this paper, we highlight the vulnerability of this improved variant under the LaMacchia et al.'s extended Canetti-Krawczyk security model [… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Three-pass protocol: One of the most interesting classical cryptographic protocols is three-pass protocol (Massey, 1988). After that the protocol used in many application (Uchoa et al, 2007;Lim et al, 2008;Abdullah et al, 2015). The protocol declares that privacy can be obtained with no advance distribution of the secret keys or public keys.…”
Section: Methodsmentioning
confidence: 99%
“…Three-pass protocol: One of the most interesting classical cryptographic protocols is three-pass protocol (Massey, 1988). After that the protocol used in many application (Uchoa et al, 2007;Lim et al, 2008;Abdullah et al, 2015). The protocol declares that privacy can be obtained with no advance distribution of the secret keys or public keys.…”
Section: Methodsmentioning
confidence: 99%
“…Over the years, many AKA protocols have been proposed. However, most of the previous AKA protocols were constructed over either conventional public-key cryptography (PKC) [4,11,13,20,25] or identity-based cryptography (IBC) [5-7, 36, 41, 44]. It is wellknown that conventional PKC suffers from the heavy certificate management problem while IBC has the key escrow and key distribution problems.…”
Section: Introductionmentioning
confidence: 99%
“…Most of these protocols are password based where a directed dictionary attack can almost always succeed to break the password. To overcome this problem, ECC based authenticated key agreement protocol in wireless network are discussed in [7][8][9][10]. These protocols utilize ECDSA signature technique which enhances the security level of user authentication and key exchange.…”
Section: Introductionmentioning
confidence: 99%