An efficient key agreement protocol for secure authentication

9Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Diffie-Hellman Key Exchange scheme can produce a common session key between the communication parties but its problem is that it makes a man-in-the middle attack possible. To solve the problem, several protocols have been proposed such as the Simple Authenticated Key Agreement (SAKA) Protocol by mainly Seo-Sweeney[6], Tseng[7], and Ku-Wang[8]. In this paper, we present a new protocol that integrates the establishment phase and the verification phase into single phase and enhances overall processing performance. Our approach does not degrade the basic requirements, safeness and efficiency by analytical analysis of the algorithm. The protocol proposed in this paper takes care of both of those phases simultaneously, which improves the processing performance rather than other approaches. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Kim, Y. S., Huh, E. N., Hwang, J., & Lee, B. W. (2004). An efficient key agreement protocol for secure authentication. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3043, 746–754. https://doi.org/10.1007/978-3-540-24707-4_87

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free