Title
A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
Abstract
Key agreement protocol is of fundamental importance in providing data confidentiality and integrity between two or more parties over an insecure network. In 2004, Popescu [14] proposed an authenticated key agreement protocol in which its security is claimed. However, Yoon and Yoo [19] discovered its vulnerabilities two years later and proposed an improved variant of it. In this paper, we highlight the vulnerability of this improved variant under the LaMacchia et al.'s extended Canetti-Krawczyk security model [12]. With this, we propose another enhanced version of Popescu's protocol which offers stronger security features and appears to be significantly more efficient than Yoon-Yoo's scheme. In order to justify our claims, we present a thorough heuristic security analysis on our scheme and compare the computational cost and security attributes with the surveyed schemes.
Year
DOI
Venue
2008
10.1007/978-3-540-79549-0_15
Networking
Keywords
Field
DocType
key agreement protocol,elliptic curve,data confidentiality,stronger security feature,security attribute,authenticated key agreement protocol,improved variant,enhanced version,computational cost,efficient three-pass,canetti-krawczyk security model,thorough heuristic security analysis,security model,security analysis,it security
Heuristic,Confidentiality,Computer security,Computer science,Security analysis,Hash function,Elliptic curve cryptography,Key-agreement protocol,Shared secret,Computer security model
Conference
Volume
ISSN
ISBN
4982
0302-9743
3-540-79548-0
Citations 
PageRank 
References 
3
0.42
16
Authors
5
Name
Order
Citations
PageRank
Meng-Hui Lim118822.66
Chee-Min Yeoh241.11
Sanggon Lee37619.98
Hyo-Taek Lim412221.69
Hoonjae Lee517323.71