INFORMATION CHANGE THE WORLD

International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.1, No.4, Aug. 2011

A New Three-party Key Exchange Protocol Based on Diffie-Hellman

Full Text (PDF, 164KB), PP.65-69


Views:30   Downloads:5

Author(s)

Chunling Liu, Yufeng Wang, Qinxi Bai

Index Terms

Diffie-Hellman; Three-party Key Exchange; DLP

Abstract

The goal of key exchange protocol is to establish a common and secure session key using the interactive communications. The existing schemes are usually in the pattern of ‘user-server-user’, so are weak in reality. In this paper, a new three-party key exchange protocol based on Diffie-Hellman was proposed which contains the following characteristics: without server; providing key secrecy and forward secrecy; ensuring no key control; ensuring known-key secrecy.

Cite This Paper

Chunling Liu, Yufeng Wang, Qinxi Bai,"A New Three-party Key Exchange Protocol Based on Diffie-Hellman", IJWMT, vol.1, no.4, pp.65-69, 2011.

Reference

[1]Wade Trappe and L. C. Washington, Cryptography and coding theory(in chinese),Beijing: Posts & Telecom Press, 2008.

[2]Yong-jun Ren , Jian-dong Wang, YiZhuang, Enhanced Identity-Based Authenticated Key Agreement Protocols in the Standard Model(in chinese), Journal of Electronics & Information Technology, 2009, vol.31,no.8, pp.1990-1995.

[3]W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, 1976, vol.22.no.9,pp.644-654. 

[4]Wenbo Mao,Modern Cryptography: Theory and Practice(in chinese),Beijing: Publishing house of Electronic Industry, 2004. 

[5]W M Li, QY Wen, H Zhang,Verifier-based password-authenticated key exchange protocol for three-party (in chinese) ,Journal on Communications, 2008, vol.29,no.10,pp.149-152, 164. 

[6]H M Sun, B C Chen, T Hwang,Secure key agreement protocols for three-party against guessing attacks,The Journal of Systems and Software, 2005, vol.75,no.1/2,pp.63-68. 

[7]Alfred J. Menezes, Paul C. van Oorschot, Handbook of Applied Cryptography (in chinese),Beijing: Publishing house of Electronic Industry, 2005. 

[8]L. Washington,Elliptic Curves: Number Theory and Cryptography, Chapman & Hall/CRC Press, 2003.