Authentication and authenticated key exchanges

W Diffie, PC Van Oorschot, MJ Wiener - Designs, Codes and cryptography, 1992 - Springer
We discuss two-party mutual authentication protocols providing authenticated key
exchange, focusing on those using asymmetric techniques. A simple, efficient protocol …

Anonymity and one-way authentication in key exchange protocols

I Goldberg, D Stebila, B Ustaoglu - Designs, Codes and Cryptography, 2013 - Springer
Key establishment is a crucial cryptographic primitive for building secure communication
channels between two parties in a network. It has been studied extensively in theory and …

[PDF][PDF] A survey of authentication protocol literature: Version 1.0

JA Clark, JL Jacob - 1997 - pure.york.ac.uk
1.1 Background The past two decades have seen an enormous increase in the development
and use of networked and distributed systems, providing increased functionality to the user …

Systematic design of two-party authentication protocols

R Bird, I Gopal, A Herzberg, P Janson, S Kutten… - Advances in Cryptology …, 1992 - Springer
We investigate protocols for authenticated exchange of messages between two parties in a
communication network. Secure authenticated exchange is essential for network security. It …

One-round protocols for two-party authenticated key exchange

IR Jeong, J Katz, DH Lee - … , ACNS 2004, Yellow Mountain, China, June 8 …, 2004 - Springer
Cryptographic protocol design in a two-party setting has often ignored the possibility of
simultaneous message transmission by each of the two parties (ie, using a duplex channel) …

Tripartite authenticated key agreement protocols from pairings

SS Al-Riyami, KG Paterson - … , Cirencester, UK, December 16-18, 2003 …, 2003 - Springer
Abstract Joux's protocol [29] is a one round, tripartite key agreement protocol that is more
bandwidth-efficient than any previous three-party key agreement protocol. But it is insecure …

Authenticated multi-party key agreement

M Just, S Vaudenay - … —ASIACRYPT'96: International Conference on the …, 1996 - Springer
We examine key agreement protocols providing (i) key authentication (ii) key confirmation
and (iii) forward secrecy. Attacks are presented against previous two-party key agreement …

Entity authentication and authenticated key transport protocols employing asymmetric techniques

S Blake-Wilson, A Menezes - International Workshop on Security Protocols, 1997 - Springer
This paper investigates security proofs for protocols that employ asymmetric (public-key
techniques to solve two problems: entity authentication and authenticated key transport. A …

[PDF][PDF] A survey of authentication protocol literature

J Clark, J Jacob - 1997 - Citeseer
1 Introduction the past two decades have seen an enormous increase in the development
and use of networked and distributed systems, providing increased functionality to the user …

Entity authentication and key distribution

M Bellare, P Rogaway - Annual international cryptology conference, 1993 - Springer
We provide the first formal treatment of entity authentication and authenticated key
distribution appropriate to the distributed environment. Addressed in detail are the problems …