2020
DOI: 10.1016/j.ic.2020.104630
|View full text |Cite
|
Sign up to set email alerts
|

An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…However, Zhang et al’s protocols did not have ephemeral key reveal resistance. In 2020, Daniel et al [ 30 ] pointed out that Bala et al’s protocol [ 21 ] could not resist an ephemeral key reveal attack. They also provided an ID-AKA protocol and presented its security proof in the eCK model [ 27 ].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…However, Zhang et al’s protocols did not have ephemeral key reveal resistance. In 2020, Daniel et al [ 30 ] pointed out that Bala et al’s protocol [ 21 ] could not resist an ephemeral key reveal attack. They also provided an ID-AKA protocol and presented its security proof in the eCK model [ 27 ].…”
Section: Related Workmentioning
confidence: 99%
“…However, its computational cost was still higher, which needed five-point multiplication operations in the elliptic curve. Furthermore, they pointed out that protocol [ 27 ] suffered from key offset attacks; however, key offset attacks could be simply avoided by adding a message authentication code using the same method in [ 30 ].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations