A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. Application of the authenticators to Diffie-Hellman variants in appropriate groups leads to authenticated key agreement protocols which have attractive properties in comparison with other proven-secure protocols. We explore two key agreement protocols that result. © Springer-Verlag Berlin Heidelberg 2004.
CITATION STYLE
Boyd, C., Mao, W., & Paterson, K. G. (2004). Key agreement using statically keyed authenticators. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3089, 248–262. https://doi.org/10.1007/978-3-540-24852-1_18
Mendeley helps you to discover research relevant for your work.