The Diffie–Hellman Protocol

被引:0
|
作者
Ueli M. Maurer
Stefan Wolf
机构
[1] Swiss Federal Institute of Technology (ETH Zürich),Computer Science Department
来源
关键词
Data Structure; Information Theory; Digital Signature; Discrete Geometry; Signature Scheme;
D O I
暂无
中图分类号
学科分类号
摘要
The 1976 seminal paper of Diffie and Hellman is a landmark in the history of cryptography. They introduced the fundamental concepts of a trapdoor one-way function, a public-key cryptosystem, and a digital signature scheme. Moreover, they presented a protocol, the so-called Diffie–Hellman protocol, allowing two parties who share no secret information initially, to generate a mutual secret key. This paper summarizes the present knowledge on the security of this protocol.
引用
收藏
页码:147 / 171
页数:24
相关论文
共 50 条
  • [21] A Fully Authenticated Diffie-Hellman Protocol and Its Application in WSNs
    Sun, Fajun
    He, Selena
    Zhang, Xiaotong
    Zhang, Jun
    Li, Qingan
    He, Yanxiang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1986 - 1999
  • [22] Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze
    Senekane, Makhamisa
    Qhobosheane, Sehlabaka
    Taele, B. M.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (06): : 30 - 34
  • [23] Fixing the integrated Diffie-Hellman-DSA key exchange protocol
    Phan, RCW
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (06) : 570 - 572
  • [24] Separating Decision Diffie–Hellman from Computational Diffie–Hellman in Cryptographic Groups
    Antoine Joux
    Kim Nguyen
    [J]. Journal of Cryptology, 2003, 16 : 239 - 247
  • [25] The larger integer library and the diffie-hellman protocol based on XTR
    Zhang, Liping
    Lei, Fengyu
    Chen, Jin
    [J]. International Journal of Digital Content Technology and its Applications, 2010, 4 (07) : 108 - 114
  • [26] Authenticated Diffie-Hellman Key Agreement Protocol with Forward Secrecy
    ZHANG Chuanrong1
    2. State Key Laboratory of Information Security/Graduate University of Chinese Academy of Science
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 641 - 644
  • [27] A Diffie-Hellman key exchange protocol without random oracles
    Jeong, I. K. Rae
    Kwon, Jeong Ok
    Lee, Dong Hoon
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 37 - +
  • [28] Diffie-Hellman to the rescue
    Tate, A
    [J]. DR DOBBS JOURNAL, 2001, 26 (06): : 12 - 12
  • [29] A simple deniable authentication protocol based on the Diffie-Hellman algorithm
    Lu, Rongxing
    Lin, Xiaodong
    Cao, Zhenfu
    Qin, Liuquan
    Liang, Xiaohui
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2008, 85 (09) : 1315 - 1323
  • [30] On the index of the Diffie–Hellman mapping
    Leyla Işık
    Arne Winterhof
    [J]. Applicable Algebra in Engineering, Communication and Computing, 2022, 33 : 587 - 595