Authors
Colin Boyd, Wenbo Mao, Kenneth G Paterson
Publication date
2004
Conference
Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings 2
Pages
248-262
Publisher
Springer Berlin Heidelberg
Description
A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. Application of the authenticators to Diffie-Hellman variants in appropriate groups leads to authenticated key agreement protocols which have attractive properties in comparison with other proven-secure protocols. We explore two key agreement protocols that result.
Total citations
20032004200520062007200820092010201120122013201420152016201720182019202020212022202320241113171481068358822112113
Scholar articles
C Boyd, W Mao, KG Paterson - Applied Cryptography and Network Security: Second …, 2004