Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
9506550 | Applied Mathematics and Computation | 2005 | 14 Pages |
Abstract
In this paper the authors present two protocols for the common key establishment. The first protocol, which has two steps, assures the authentication of the common agreement key. The second one is a three-pass authenticated agreement key protocol and it contains a step for the key confirmation. The security of both protocols results from the elliptic curve discrete logarithm problem and their security proof follows from some well known definitions. Also, the attack discussion of elliptic curve discrete logarithm problem is presented.
Keywords
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
George Stephanides, Nicolae Constantinescu,