Authenticated Diffie-Hellman key agreement protocols

被引:0
|
作者
Blake-Wilson, S
Menezes, A
机构
[1] Certicom Res, Mississauga, ON L5R 3L7, Canada
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper surveys recent work on the design and analysis of key agreement protocols that are based on the intractability of the Diffie-Hellman problem. The focus is on protocols that have been standardized, or are in the process of being standardized, by organizations such as ANSI, IEEE, ISO/IEC, and NIST. The practical and provable security aspects of these protocols are discussed.
引用
收藏
页码:339 / 361
页数:23
相关论文
共 50 条
  • [21] Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms
    Maurer, U
    Wolf, S
    1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 327 - 327
  • [22] On the bit security of the Diffie-Hellman key
    Ian F. Blake
    Theo Garefalakis
    Igor E. Shparlinski
    Applicable Algebra in Engineering, Communication and Computing, 2006, 16 : 397 - 404
  • [23] On the bit security of the Diffie-Hellman key
    Blake, IF
    Garefalakis, T
    Shparlinski, IE
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2006, 16 (06) : 397 - 404
  • [24] Using the Modified Diffie-Hellman Problem to Enhance Client Computational Performance in a Three-Party Authenticated Key Agreement
    Chien, Hung-Yu
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) : 637 - 644
  • [25] A Generic Approach to Improving Diffie-Hellman Key Agreement Efficiency for Thin Clients
    Chien, Hung-Yu
    COMPUTER JOURNAL, 2016, 59 (04): : 592 - 601
  • [26] Vulnerability of an Improved Elliptic Curve Diffie-Hellman Key Agreement And Its Enhancement
    Mohammad, Zeyad
    Lo, Chi-Chun
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 128 - 132
  • [27] Implementation of Elliptic Curve Diffie-Hellman Key Agreement Scheme on IRIS Nodes
    Zhang, Xing
    Ma, Shaohua
    Han, Dong
    Shi, Wei
    PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTERNET OF THINGS, 2015, : 160 - 163
  • [28] An Efficient Improved Group Key Agreement Protocol Based on Diffie-Hellman Key Exchange
    Yang Guang-ming
    Chen Jin-ming
    Lu Ya-feng
    Ma Da-Ming
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 2, 2010, : 303 - 306
  • [29] Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
    Ustaoglu, Berkant
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 183 - 197
  • [30] A Fully Authenticated Diffie-Hellman Protocol and Its Application in WSNs
    Sun, Fajun
    He, Selena
    Zhang, Xiaotong
    Zhang, Jun
    Li, Qingan
    He, Yanxiang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1986 - 1999