Article ID Journal Published Year Pages File Type
9506508 Applied Mathematics and Computation 2005 5 Pages PDF
Abstract
In 2004, Chien and Jan pointed out that Yeh et al.'s authenticated multiple-key key agreement protocol was vulnerable to the impersonation attack. For enhancing the security and key utilization, Chien and Jan proposed an improved protocol. However, Yang and Wang showed that Chien-Jan's protocol is vulnerable to the impersonation attack. This paper proposes an improved protocol to overcome the weakness while maintaining the advantages of Chien-Jan's protocol.
Related Topics
Physical Sciences and Engineering Mathematics Applied Mathematics
Authors
, , ,