Authors
Colin Boyd, Wenbo Mao, Kenneth G Paterson
Publication date
2004
Conference
Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings 2
Pages
248-262
Publisher
Springer Berlin Heidelberg
Description
A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. Application of the authenticators to Diffie-Hellman variants in appropriate groups leads to authenticated key agreement protocols which have attractive properties in comparison with other proven-secure protocols. We explore two key agreement protocols that result.
Total citations
Scholar articles
C Boyd, W Mao, KG Paterson - Applied Cryptography and Network Security: Second …, 2004