Full metadata record
DC FieldValueLanguage
dc.contributor.authorMohammad, Zeyaden_US
dc.contributor.authorLo, Chi-Chunen_US
dc.date.accessioned2014-12-08T15:25:34Z-
dc.date.available2014-12-08T15:25:34Z-
dc.date.issued2009en_US
dc.identifier.isbn978-1-4244-2909-7en_US
dc.identifier.urihttp://hdl.handle.net/11536/17967-
dc.description.abstractAuthenticated key agreement protocols are a foundation for delivering an authenticated session key between the intended two-party participants from a set of parties over an insecure network. Wang et al proposed protocol ECKE-1N to overcome KCI-R attacks in ECKE-1 as an implicit authenticated key agreement protocol based on Diffie-Hellman elliptic curve. In this paper, we show that ECKE-1N is vulnerable to both leakage of ephemeral private keys and KCI-R attacks. We present an enhanced protocol EECKE-1N, which can withstand KCI-R attacks and revelations both of ephemeral keys. Furthermore, EECKE-1N can provide desirable security proprieties.en_US
dc.language.isoen_USen_US
dc.subjectelliptic curveen_US
dc.subjectkey agreementen_US
dc.subjectkey compromise impersonatian resilienceen_US
dc.subjectpassive attack resiliencen_US
dc.titleVulnerability of an Improved Elliptic Curve Diffie-Hellman Key Agreement And Its Enhancementen_US
dc.typeArticleen_US
dc.identifier.journal2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2en_US
dc.citation.spage128en_US
dc.citation.epage132en_US
dc.contributor.department資訊管理與財務金融系 註:原資管所+財金所zh_TW
dc.contributor.departmentDepartment of Information Management and Financeen_US
dc.identifier.wosnumberWOS:000271558100027-
Appears in Collections:Conferences Paper