International Journal of Wireless and Microwave Technologies(IJWMT)
ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)
Published By: MECS Press
IJWMT Vol.1, No.4, Aug. 2011
A New Three-party Key Exchange Protocol Based on Diffie-Hellman
Full Text (PDF, 164KB), PP.65-69
Views:30 Downloads:5
Author(s)
Index Terms
Abstract
The goal of key exchange protocol is to establish a common and secure session key using the interactive communications. The existing schemes are usually in the pattern of ‘user-server-user’, so are weak in reality. In this paper, a new three-party key exchange protocol based on Diffie-Hellman was proposed which contains the following characteristics: without server; providing key secrecy and forward secrecy; ensuring no key control; ensuring known-key secrecy.
Cite This Paper
Chunling Liu, Yufeng Wang, Qinxi Bai,"A New Three-party Key Exchange Protocol Based on Diffie-Hellman", IJWMT, vol.1, no.4, pp.65-69, 2011.
Reference
[1]Wade Trappe and L. C. Washington, Cryptography and coding theory(in chinese),Beijing: Posts & Telecom Press, 2008.
[2]Yong-jun Ren , Jian-dong Wang, YiZhuang, Enhanced Identity-Based Authenticated Key Agreement Protocols in the Standard Model(in chinese), Journal of Electronics & Information Technology, 2009, vol.31,no.8, pp.1990-1995.
[3]W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, 1976, vol.22.no.9,pp.644-654.
[4]Wenbo Mao,Modern Cryptography: Theory and Practice(in chinese),Beijing: Publishing house of Electronic Industry, 2004.
[5]W M Li, QY Wen, H Zhang,Verifier-based password-authenticated key exchange protocol for three-party (in chinese) ,Journal on Communications, 2008, vol.29,no.10,pp.149-152, 164.
[6]H M Sun, B C Chen, T Hwang,Secure key agreement protocols for three-party against guessing attacks,The Journal of Systems and Software, 2005, vol.75,no.1/2,pp.63-68.
[7]Alfred J. Menezes, Paul C. van Oorschot, Handbook of Applied Cryptography (in chinese),Beijing: Publishing house of Electronic Industry, 2005.
[8]L. Washington,Elliptic Curves: Number Theory and Cryptography, Chapman & Hall/CRC Press, 2003.