2015
DOI: 10.1007/s11277-015-2375-5
|View full text |Cite
|
Sign up to set email alerts
|

Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 48 publications
(40 citation statements)
references
References 41 publications
0
40
0
Order By: Relevance
“…In this study, we evaluate escrow-free alternatives that might be adequate for the IoT scenario, showing that the SMQV protocol combined with implicit certificates is an appealing alternative for tackling this issue: this combination not only avoids the transmission costs of full-fledged PKIbased certificates, but also leads to a scheme that is more efficient than similar-purpose lightweight solutions. Actually, even though we were able to identify in the literature recently proposed AKA schemes that are potentially more efficient than SMQV (namely, [39] , [43] and [40] ), they display severe security flaws, which indicates that bringing significant improvements over SMQV is not an easy task. …”
Section: Final Considerationsmentioning
confidence: 94%
See 3 more Smart Citations
“…In this study, we evaluate escrow-free alternatives that might be adequate for the IoT scenario, showing that the SMQV protocol combined with implicit certificates is an appealing alternative for tackling this issue: this combination not only avoids the transmission costs of full-fledged PKIbased certificates, but also leads to a scheme that is more efficient than similar-purpose lightweight solutions. Actually, even though we were able to identify in the literature recently proposed AKA schemes that are potentially more efficient than SMQV (namely, [39] , [43] and [40] ), they display severe security flaws, which indicates that bringing significant improvements over SMQV is not an easy task. …”
Section: Final Considerationsmentioning
confidence: 94%
“…Finally, with a growing interest in bringing efficient and escrowless AKA solutions to the context of WSNs, a few pairing-free schemes based on the certificate-less paradigm appeared in the literature in the last few years [38][39][40][41][42][43] . Most of them involve more computation than traditional and well analyzed AKA pro- tocols, such as MQV [22] and its variants (e.g., HMQV [44] and SMQV [23] ).…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The AKE schemes in identity-based setup using elliptic curves were analyzed, for example, in [32,33]. Those 2-round schemes are still vulnerable to eKCI attacks (actually the first one does not withstand the regular KCI as well).…”
Section: Previous Workmentioning
confidence: 99%