Two improved two-party identity-based authenticated key agreement protocols
Many authenticated key agreement protocols based on identity information were published
in recent years. Hsieh et al. presented their protocol in 2002. However, Tseng et al. found a
flaw in the protocol which resulted in a key compromise impersonation attack. Later, Tseng
proposed his protocol conforming which conforms to all desirable security properties and is
efficient. In this paper we propose two new two-party identity-based authenticated key
agreement protocols. The first is based on Hsieh et al.'s protocol and makes it immune …
in recent years. Hsieh et al. presented their protocol in 2002. However, Tseng et al. found a
flaw in the protocol which resulted in a key compromise impersonation attack. Later, Tseng
proposed his protocol conforming which conforms to all desirable security properties and is
efficient. In this paper we propose two new two-party identity-based authenticated key
agreement protocols. The first is based on Hsieh et al.'s protocol and makes it immune …
以上显示的是最相近的搜索结果。 查看全部搜索结果