Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

An Efficient Two-Party Identity-Based Key Exchange Protocol

An Efficient Two-Party Identity-Based Key Exchange Protocol A key exchange (or agreement) protocol is designed to allow two entities establishing a session key to encrypt the communication data over an open network. In 1990, Gunther proposed an identity-based key exchange protocol based on the difficulty of computing a discrete logarithm problem. Afterwards, several improved protocols were proposed to reduce the number of communication steps and the communicational cost required by Gunther's protocol. This paper presents an efficient identity-based key exchange protocol based on the difficulty of computing a discrete logarithm problem. As compared with the previously proposed protocols, it has better performance in terms of the computational cost and the communication steps. The proposed key exchange protocol provides implicit key authentication as well as the desired security attributes of an authenticated key exchange protocol. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Informatica IOS Press

An Efficient Two-Party Identity-Based Key Exchange Protocol

Informatica , Volume 18 (1) – Jan 1, 2007

Loading next page...
 
/lp/ios-press/an-efficient-two-party-identity-based-key-exchange-protocol-S0y1rLoHnd

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
IOS Press
Copyright
Copyright © 2007 by IOS Press, Inc
ISSN
0868-4952
eISSN
1822-8844
Publisher site
See Article on Publisher Site

Abstract

A key exchange (or agreement) protocol is designed to allow two entities establishing a session key to encrypt the communication data over an open network. In 1990, Gunther proposed an identity-based key exchange protocol based on the difficulty of computing a discrete logarithm problem. Afterwards, several improved protocols were proposed to reduce the number of communication steps and the communicational cost required by Gunther's protocol. This paper presents an efficient identity-based key exchange protocol based on the difficulty of computing a discrete logarithm problem. As compared with the previously proposed protocols, it has better performance in terms of the computational cost and the communication steps. The proposed key exchange protocol provides implicit key authentication as well as the desired security attributes of an authenticated key exchange protocol.

Journal

InformaticaIOS Press

Published: Jan 1, 2007

There are no references for this article.