We describe two new attacks on the HMQV protocol. The first attack raises a serious question on the basic definition of "authentication" in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr's signature. Among all the related protocols, YAK appears to be the simplest so far. We believe simplicity is an important engineering principle. © 2010 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Hao, F. (2010). On robust key agreement based on public key authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6052 LNCS, pp. 383–390). https://doi.org/10.1007/978-3-642-14577-3_33
Mendeley helps you to discover research relevant for your work.