Sciweavers

1116 search results - page 6 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
99
Voted
SCN
2010
Springer
138views Communications» more  SCN 2010»
15 years 16 days ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov
127
Voted
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
15 years 6 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
125
Voted
ASIACRYPT
2010
Springer
15 years 5 days ago
Generic Compilers for Authenticated Key Exchange
So far, all solutions proposed for authenticated key agreement combine key agreement and authentication into a single cryptographic protocol. However, in many important applicatio...
Tibor Jager, Florian Kohlar, Sven Schäge, J&o...
INDOCRYPT
2004
Springer
15 years 7 months ago
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model
A definition of secure multi-party key exchange in the Canetti-Krawczyk proof model is proposed, followed by a proof of the security of the Joux tripartite key agreement protocol...
Yvonne Hitchcock, Colin Boyd, Juan Manuel Gonz&aac...
FC
2010
Springer
205views Cryptology» more  FC 2010»
15 years 6 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao