z-logo
open-access-imgOpen Access
An Authenticated Key Agreement Protocol Using Isogenies Between Elliptic Curves
Author(s) -
Debiao He,
Jianhua Chen,
Hu Jin
Publication year - 2011
Publication title -
international journal of computers communications and control
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.422
H-Index - 33
eISSN - 1841-9844
pISSN - 1841-9836
DOI - 10.15837/ijccc.2011.2.2174
Subject(s) - computer science , key (lock) , session key , computer security , cryptosystem , protocol (science) , public key cryptography , session (web analytics) , computer network , cryptography , encryption , medicine , alternative medicine , pathology , world wide web
All the current public-key cryptosystems will become insecure when size of a quantum register is sufficient. An authenticated key agreement protocol, which is against the attack of quantum computer, is proposed. The proposed protocol can provide the security properties known session key security, forward security, resistance to key-compromise impersonation attack and to unknown key-share attack, key control. We also prove its security in a widely accepted model.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom