Sciweavers

IMA
1997
Springer

Key Agreement Protocols and Their Security Analysis

14 years 4 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalmodel of distributed computing is provided, and a de nition of the goals within this model supplied. The protocols proposed are then proven correct within this framework in the random oracle model. We emphasize the relevance of these theoretical results to the security of systems used in practice. Practical implementation of the protocols is discussed. Such implementations are currently under consideration for standardization 2, 3, 21 .
Simon Blake-Wilson, Don Johnson, Alfred Menezes
Added 08 Aug 2010
Updated 08 Aug 2010
Type Conference
Year 1997
Where IMA
Authors Simon Blake-Wilson, Don Johnson, Alfred Menezes
Comments (0)