z-logo
open-access-imgOpen Access
Three-party authenticated key agreements for optimal communication
Author(s) -
Tian Fu Lee,
Tzonelih Hwang
Publication year - 2017
Publication title -
plos one
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.99
H-Index - 332
ISSN - 1932-6203
DOI - 10.1371/journal.pone.0174473
Subject(s) - computer science , session key , authenticated key exchange , session (web analytics) , key (lock) , computer security , computer network , key exchange , cryptosystem , key distribution , key encapsulation , pre shared key , security association , channel (broadcasting) , shared secret , cryptography , public key cryptography , encryption , world wide web , network access control , cloud computing , cloud computing security , operating system
Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here