Title
Key Agreement Protocols and Their Security Analysis
Abstract
This paper proposes new protocols for two goals: authenticated key agreement andauthenticated key agreement with key confirmation in the asymmetric (public-key) setting.A formal model of distributed computing is provided, and a definition of the goalswithin this model supplied. The protocols proposed are then proven correct within thisframework in the random oracle model. We emphasize the relevance of these theoreticalresults to the security of systems used in practice. Practical...
Year
DOI
Venue
1997
10.1007/BFb0024447
IMA Int. Conf.
Keywords
Field
DocType
security analysis,key agreement protocols,random oracle model,distributed computing,key agreement protocol,public key
Station-to-Station protocol,Authentication,MQV,Computer science,Cryptography,Random oracle,Security analysis,SPEKE,Key-agreement protocol,Distributed computing
Conference
ISBN
Citations 
PageRank 
3-540-63927-6
227
14.83
References 
Authors
16
3
Search Limit
100227
Name
Order
Citations
PageRank
Simon Blake-wilson148133.51
Don Johnson261837.79
Alfred Menezes363347.23