On Robust Key Agreement Based on Public Key Authentication

被引:0
|
作者
Hao, Feng [1 ]
机构
[1] Thales Secur E, Cambridge, England
来源
关键词
PROTOCOL; EXCHANGE; SECURE; HMQV;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We describe two new attacks on the HMQV protocol. The first attack raises a serious question on the basic definition of "authentication" in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr's signature. Among all the related protocols, YAK appears to be the simplest so far. We believe simplicity is an important engineering principle.
引用
收藏
页码:383 / 390
页数:8
相关论文
共 50 条
  • [1] On robust key agreement based on public key authentication
    Hao, Feng
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (01) : 77 - 87
  • [3] Robust authentication and key agreement scheme preserving the privacy of secret key
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 274 - 280
  • [4] An LTE Authentication and Key Agreement Protocol Based on the ECC Self-Certified Public Key
    Lu, Xiaofeng
    Yang, Fan
    Zou, Luwen
    Lio, Pietro
    Hui, Pan
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2023, 31 (03) : 1101 - 1116
  • [5] A Multi-Party User Authentication and Key Agreement Protocol Based on Public Key Cryptosystem
    Yalamanchili, Sushma
    Rao, M. Kameswara
    Smitha, Ch.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (10): : 80 - 84
  • [6] Robust Remote Mutual Authentication Scheme with Key Agreement
    Chou, Chih-Ho
    Tsai, Kuo-Yu
    Wu, Tzong-Chen
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (07): : 1283 - 1289
  • [7] Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption
    Sciancalepore, Savio
    Piro, Giuseppe
    Boggia, Gennaro
    Bianchi, Giuseppe
    IEEE EMBEDDED SYSTEMS LETTERS, 2017, 9 (01) : 1 - 4
  • [8] Robust key authentication scheme resistant to public key, substitution attacks
    Wu, TS
    Lin, HY
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 157 (03) : 825 - 833
  • [9] Group-Based Authentication and Key Agreement
    Yu-Wen Chen
    Jui-Tang Wang
    Kuang-Hui Chi
    Chien-Chao Tseng
    Wireless Personal Communications, 2012, 62 : 965 - 979
  • [10] Group-Based Authentication and Key Agreement
    Chen, Yu-Wen
    Wang, Jui-Tang
    Chi, Kuang-Hui
    Tseng, Chien-Chao
    WIRELESS PERSONAL COMMUNICATIONS, 2012, 62 (04) : 965 - 979