We also present an improved protocol --- ECKE-1N, which can withstand such attacks. The improved protocol's performance is comparable to the well-known MQV protocol and maintains the same remarkable list of security properties.
Category / Keywords: Key agreement, elliptic curve cryptography, Diffie--Hellman protocol, key-compromise impersonation, MQV Publication Info: IEEE Communications Letters Date: received 26 Jan 2007, last revised 14 Dec 2007 Contact author: shengbao-wang at cs sjtu edu cn Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation Note: In this letter, we propose an authenticated key agreement protocol whose performance is comparable to the well-known (H)MQV protocol. The new protocol can also be seen as a (secure) descendant of the famous MTI/C0 protocol. Version: 20071214:080313 (All versions of this report) Short URL: ia.cr/2007/026 Discussion forum: Show discussion | Start new discussion