Premium
An efficient protocol for two‐party explicit authenticated key agreement
Author(s) -
Zheng Minghui,
Zhou Huihua,
Chen Jing
Publication year - 2013
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.3198
Subject(s) - computer science , key agreement protocol , random oracle , key (lock) , protocol (science) , computer security , public key cryptography , concurrency , key management , universal composability , oakley protocol , computer network , cryptographic protocol , distributed computing , key distribution , cryptography , encryption , medicine , alternative medicine , pathology
Summary Successful and efficient key management plays a critical role toward secured computing and communication systems. Many authenticated key agreement protocols have been proposed to meet the great challenges of information security. The two‐party key agreement protocol can be classified into two categories: implicit and explicit key authentications. This paper investigates the issue on authenticated two‐party key agreement protocol over an insecure public network and extends the existing implicit authenticated key agreement protocol into the explicit one by introducing the authenticators. The advantage of this explicit protocol is that it does not need any fixed public key infrastructure. Furthermore, this explicit protocol is provably secure in the random oracle under the Computation Gap Diffie‐Hellman assumption. Concurrency and Computation: Practice and Experience, 2013.© 2013 Wiley Periodicals, Inc.