Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Improvement of an Authenticated Key Agreement Protocol

  • Conference paper
Advances in Web and Network Technologies, and Information Management (APWeb 2007, WAIM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4537))

  • 2492 Accesses

Abstract

Popescu proposed an authenticated key agreement protocol based on Diffie-Hellman key agreement, which works in an elliptic curve group. The author also presented a simpler authenticated key agreement protocol than the the proposed one and a multiple key agreement protocol which enables the participants to share two or more keys in one execution of the protocol. However, in this paper, we show that their protocols do not authenticate each other. We also present an improved version.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and Their Security Analysis. In: Proceedings of Sixth IMA International Conference on Cryptography and Coding, Cirencester, UK, pp. 30–45 (1997)

    Google Scholar 

  2. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory, IT 22(6), 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  3. Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48, 203–209 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  4. Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient Protocol for Authenticated Key Agreement, Technical Report CORR98-05, Department of CO, University of Waterloo (1998)

    Google Scholar 

  5. Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient Protocol for Authenticated Key Agreement. Designs, Codes and Cryptography 28(2), 119–134 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  6. Miller, V.: Uses of elliptic curves in cryptography. In: Proceedings of Crypto 1985, Santa Barbara, USA, pp. 417–426 (1986)

    Google Scholar 

  7. National Institute of Standards and Technology, Secure Hash Standard (SHS), FIPS Publication pp. 180–181 (1995)

    Google Scholar 

  8. Popescu, C.: A Secure Key Agreement Protocol Using Elliptic Curves. International Journal of Computers and Applications 27(3), 147–152 (2005)

    Article  Google Scholar 

  9. Vanstone, S.: Responses to NIST’s Proposal. Communications of the ACM 35, 50–52 (1992)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Kevin Chen-Chuan Chang Wei Wang Lei Chen Clarence A. Ellis Ching-Hsien Hsu Ah Chung Tsoi Haixun Wang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, Y., Wei, W., Cao, T. (2007). Improvement of an Authenticated Key Agreement Protocol. In: Chang, K.CC., et al. Advances in Web and Network Technologies, and Information Management. APWeb WAIM 2007 2007. Lecture Notes in Computer Science, vol 4537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72909-9_66

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72909-9_66

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72908-2

  • Online ISBN: 978-3-540-72909-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics