Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mohammad, Zeyad | en_US |
dc.contributor.author | Lo, Chi-Chun | en_US |
dc.date.accessioned | 2014-12-08T15:25:34Z | - |
dc.date.available | 2014-12-08T15:25:34Z | - |
dc.date.issued | 2009 | en_US |
dc.identifier.isbn | 978-1-4244-2909-7 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/17967 | - |
dc.description.abstract | Authenticated key agreement protocols are a foundation for delivering an authenticated session key between the intended two-party participants from a set of parties over an insecure network. Wang et al proposed protocol ECKE-1N to overcome KCI-R attacks in ECKE-1 as an implicit authenticated key agreement protocol based on Diffie-Hellman elliptic curve. In this paper, we show that ECKE-1N is vulnerable to both leakage of ephemeral private keys and KCI-R attacks. We present an enhanced protocol EECKE-1N, which can withstand KCI-R attacks and revelations both of ephemeral keys. Furthermore, EECKE-1N can provide desirable security proprieties. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | elliptic curve | en_US |
dc.subject | key agreement | en_US |
dc.subject | key compromise impersonatian resilience | en_US |
dc.subject | passive attack resilienc | en_US |
dc.title | Vulnerability of an Improved Elliptic Curve Diffie-Hellman Key Agreement And Its Enhancement | en_US |
dc.type | Article | en_US |
dc.identifier.journal | 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2 | en_US |
dc.citation.spage | 128 | en_US |
dc.citation.epage | 132 | en_US |
dc.contributor.department | 資訊管理與財務金融系 註:原資管所+財金所 | zh_TW |
dc.contributor.department | Department of Information Management and Finance | en_US |
dc.identifier.wosnumber | WOS:000271558100027 | - |
Appears in Collections: | Conferences Paper |