Key-agreement protocol

Known as: Key agreement, Key agreement protocol 
In cryptography, a key-agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In recent years, a large number of identity- based key agreement protocols from pairings have been proposed. Some of them are… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
The security of key agreement protocols has traditionally been notoriously hard to establish. In this paper we present a modular… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
This paper analyzes the authentication and key agreement protocol adopted by Universal Mobile Telecommunication System (UMTS), an… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
  • M. Maurer
  • 2004
The problem of generating a shared secret key S by two parties knowing dependent random variables X and I’, respectively, but not… (More)
Is this relevant?
2002
2002
An important and popular trend in modern computing is to convert traditional centralized services into distributed services… (More)
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
  • N P S M A R T
  • 2002
We describe an ID based authenticated two pass key agreement protocol which makes use of the Weil pairing The protocol is… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We investigate a number of issues related to identity based authenticated key agreement protocols using the Weil or Tate pairings… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Many modern computing environments involve dynamic peer groups. Distributed simulation, multiuser games, conferencing… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation… (More)
Is this relevant?