A secure key agreement protocol using elliptic curves

@inproceedings{Popescu2005ASK,
  title={A secure key agreement protocol using elliptic curves},
  author={Corina Popescu},
  year={2005}
}
The author proposes a secure protocol for authenticated key agreement based on Diffie-Hellman key agreement, which works in an elliptic curve group. The article also presents a simpler authenticated key agreement protocol than the proposed one and a multiple key agreement protocol that enables participants to share two or more keys in one execution of the protocol. The protocols are shown to meet the security attributes under the assumption that the elliptic curve discrete logarithm problem is… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 11 CITATIONS

A usability study of elliptic curves

VIEW 1 EXCERPT
CITES BACKGROUND

A Novel Remote User Authentication Scheme Using Smart Card Based on ECDLP

  • 2009 International Conference on Advanced Computer Control
  • 2009
VIEW 1 EXCERPT
CITES BACKGROUND

A Secure Off-Line Electronic Cash Scheme Based on ECDLP

  • 2009 First International Workshop on Education Technology and Computer Science
  • 2009
VIEW 1 EXCERPT
CITES METHODS

A modified remote user authentication scheme using smart card based on ECDLP

  • 2009 International Conference on Industrial and Information Systems (ICIIS)
  • 2009
VIEW 1 EXCERPT
CITES BACKGROUND

A Novel Protocol for Smart Card Using ECDLP

  • 2008 First International Conference on Emerging Trends in Engineering and Technology
  • 2008
VIEW 1 EXCERPT
CITES BACKGROUND

Sender Authenticated Key Agreements Without Random Oracles

  • 2007 International Conference on Convergence Information Technology (ICCIT 2007)
  • 2007
VIEW 2 EXCERPTS
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 35 REFERENCES

A One Round Protocol for Tripartite Diffie–Hellman

  • Journal of Cryptology
  • 2004
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

H

T. Matsumoto, Y. Takashima
  • Imai, On seeking smart public-key distribution systems, The Transactions of the IECE of Japan, 69 (2)
  • 1986
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

S

L. Law, A. Menezes, M. Qu, J. Solinas
  • Vanstone, An efficient Protocol for Authenticated Key Agreement, Designs, Codes and Cryptography, 28 (2)
  • 2003
VIEW 10 EXCERPTS
HIGHLY INFLUENTIAL

Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols

  • IACR Cryptology ePrint Archive
  • 2003
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Authenticated Diffie-Hellman Key Agreement Protocols

  • Selected Areas in Cryptography
  • 1998
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL