Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
9506508 | Applied Mathematics and Computation | 2005 | 5 Pages |
Abstract
In 2004, Chien and Jan pointed out that Yeh et al.'s authenticated multiple-key key agreement protocol was vulnerable to the impersonation attack. For enhancing the security and key utilization, Chien and Jan proposed an improved protocol. However, Yang and Wang showed that Chien-Jan's protocol is vulnerable to the impersonation attack. This paper proposes an improved protocol to overcome the weakness while maintaining the advantages of Chien-Jan's protocol.
Keywords
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo,