Key Agreement Protocols and Their Security Analysis

@inproceedings{BlakeWilson1997KeyAP,
  title={Key Agreement Protocols and Their Security Analysis},
  author={S. Blake-Wilson and D. Johnson and A. Menezes},
  booktitle={IMACC},
  year={1997}
}
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key confirmation in the asymmetric (public-key) setting. A formal model of distributed computing is provided, and a definition of the goals within this model supplied. The protocols proposed are then proven correct within this framework in the random oracle model. We emphasize the relevance of these theoretical results to the security of systems used in practice. Practical… Expand
571 Citations
Certificate-based authenticated key agreement protocols
The agreement of the common key
New authenticated key agreement protocols
The GN-authenticated key agreement
A Secure Key Agreement Protocol Using Elliptic Curves
A secure authenticated key agreement protocol
  • C. Popescu
  • Computer Science
  • Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)
  • 2004
ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 45 REFERENCES
Authentication and authenticated key exchanges
Authenticated Multi-Party Key Agreement
Entity Authentication and Key Distribution
Systematic Design of Two-Party Authentication Protocols
Security Proofs for Signature Schemes
On the Risk of Opening Distributed Keys
...
1
2
3
4
5
...