Key agreement using statically keyed authenticators

62Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. Application of the authenticators to Diffie-Hellman variants in appropriate groups leads to authenticated key agreement protocols which have attractive properties in comparison with other proven-secure protocols. We explore two key agreement protocols that result. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Boyd, C., Mao, W., & Paterson, K. G. (2004). Key agreement using statically keyed authenticators. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3089, 248–262. https://doi.org/10.1007/978-3-540-24852-1_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free