Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices.
Debiao HeJianhua ChenJin HuPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- key agreement
- key agreement protocol
- mobile devices
- mutual authentication
- security analysis
- privacy protection
- secret key
- authentication scheme
- rfid tags
- authentication protocol
- diffie hellman
- trusted third party
- provably secure
- real time
- security properties
- elliptic curve
- private key
- key distribution
- smart card
- public key
- security model
- key management