In this paper, we introduce the definition of insider impersonation-MIM attack for tripartite key agreement schemes and show that almost all of the proposed schemes are not secure under this attack. We present a new protocol which is much more efficient than the existential secure protocol [13] in terms of computational efficiency and transmitted data size. Moreover, our protocol is the first scheme for multiple keys which means that not only a large number of keys but also various kinds of keys can be generated by applying our scheme. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Wang, L., Okamoto, T., Takagi, T., & Okamoto, E. (2005). Insider impersonation-MIM attack to tripartite key agreement scheme and an efficient protocol for multiple keys. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3802 LNAI, pp. 198–203). Springer Verlag. https://doi.org/10.1007/11596981_30
Mendeley helps you to discover research relevant for your work.