Article ID Journal Published Year Pages File Type
9506550 Applied Mathematics and Computation 2005 14 Pages PDF
Abstract
In this paper the authors present two protocols for the common key establishment. The first protocol, which has two steps, assures the authentication of the common agreement key. The second one is a three-pass authenticated agreement key protocol and it contains a step for the key confirmation. The security of both protocols results from the elliptic curve discrete logarithm problem and their security proof follows from some well known definitions. Also, the attack discussion of elliptic curve discrete logarithm problem is presented.
Keywords
Related Topics
Physical Sciences and Engineering Mathematics Applied Mathematics
Authors
, ,