A new elliptic curve diffie-hellman two-party key agreement protocol

Abstract

In SAC'05, Strangio proposed protocol ECKE-1 as an efficient elliptic curve Diffie-Hellman two-party key agreement protocol using public key authentication. However, Wang et al. showed that the ECKE-1 protocol is vulnerable to key-compromise impersonation attacks. They also presented an improved protocol ECKE-1N, which can withstand such attacks. This paper… (More)

2 Figures and Tables

Topics

  • Presentations referencing similar topics