Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys.
Lihua WangTakeshi OkamotoTsuyoshi TakagiEiji OkamotoPublished in: CIS (2) (2005)
Keyphrases
- key agreement
- mutual authentication
- secret key
- security analysis
- authentication protocol
- security properties
- smart card
- elliptic curve
- key agreement protocol
- diffie hellman
- authentication scheme
- key distribution
- public key
- encryption scheme
- security requirements
- security model
- efficient computation
- formal model
- lightweight
- secure communication
- rfid systems
- cryptographic protocols
- ciphertext
- digital signature
- signature scheme