Abstract | ||
---|---|---|
This paper proposes new protocols for two goals: authenticated key agreement andauthenticated key agreement with key confirmation in the asymmetric (public-key) setting.A formal model of distributed computing is provided, and a definition of the goalswithin this model supplied. The protocols proposed are then proven correct within thisframework in the random oracle model. We emphasize the relevance of these theoreticalresults to the security of systems used in practice. Practical... |
Year | DOI | Venue |
---|---|---|
1997 | 10.1007/BFb0024447 | IMA Int. Conf. |
Keywords | Field | DocType |
security analysis,key agreement protocols,random oracle model,distributed computing,key agreement protocol,public key | Station-to-Station protocol,Authentication,MQV,Computer science,Cryptography,Random oracle,Security analysis,SPEKE,Key-agreement protocol,Distributed computing | Conference |
ISBN | Citations | PageRank |
3-540-63927-6 | 227 | 14.83 |
References | Authors | |
16 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Simon Blake-wilson | 1 | 481 | 33.51 |
Don Johnson | 2 | 618 | 37.79 |
Alfred Menezes | 3 | 633 | 47.23 |