Authors
Sattam S Al-Riyami, Kenneth G Paterson
Publication date
2003
Conference
Cryptography and Coding: 9th IMA International Conference, Cirencester, UK, December 16-18, 2003. Proceedings 9
Pages
332-359
Publisher
Springer Berlin Heidelberg
Description
Joux’s protocol [29] is a one round, tripartite key agreement protocol that is more bandwidth-efficient than any previous three-party key agreement protocol. But it is insecure, suffering from a simple man-in-the-middle attack. This paper shows how to make Joux’s protocol secure, presenting several tripartite, authenticated key agreement protocols that still require only one round of communication and no signature computations. A pass-optimal authenticated and key confirmed tripartite protocol that generalises the station-to-station protocol is also presented. The security properties of the new protocols are studied using provable security methods and heuristic approaches. Applications for the protocols are also discussed.
Total citations
Scholar articles
SS Al-Riyami, KG Paterson - Cryptography and Coding: 9th IMA International …, 2003
SS Al-Riyami - http://eprint. iacr. org., 2002