Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security.
Xiangyu LiuShengli LiuDawu GuJian WengPublished in: ASIACRYPT (2) (2020)
Keyphrases
- key exchange
- security analysis
- key distribution
- session key
- security requirements
- key exchange protocol
- secure communication
- diffie hellman
- password based authenticated key exchange
- user authentication
- public key
- authentication protocol
- key agreement protocol
- key management
- security properties
- smart card
- private key
- authentication scheme
- digital signature
- fault tolerant
- encryption scheme
- security policies
- ad hoc networks
- information security