Two improved two-party identity-based authenticated key agreement protocols

M Hölbl, T Welzer - Computer Standards & Interfaces, 2009 - Elsevier
Many authenticated key agreement protocols based on identity information were published
in recent years. Hsieh et al. presented their protocol in 2002. However, Tseng et al. found a
flaw in the protocol which resulted in a key compromise impersonation attack. Later, Tseng
proposed his protocol conforming which conforms to all desirable security properties and is
efficient. In this paper we propose two new two-party identity-based authenticated key
agreement protocols. The first is based on Hsieh et al.'s protocol and makes it immune …
以上显示的是最相近的搜索结果。 查看全部搜索结果