2010 2nd International Conference on Computer Engineering and Technology 2010
DOI: 10.1109/iccet.2010.5485778
|View full text |Cite
|
Sign up to set email alerts
|

An efficient password security of multi-party Key Exchange Protocol using secret sharing based on ECDLP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…The order of the base point P is equal to n . The standards often suggest that we select an elliptic curve with prime order and therefore any element of the group would be selected and their order will be the prime number n [5] [6]. At the end of the protocol, the communicating parties end up with the same value K which is a point on the curve.…”
Section: Elliptic Curve Diffie-helmanmentioning
confidence: 99%
See 4 more Smart Citations
“…The order of the base point P is equal to n . The standards often suggest that we select an elliptic curve with prime order and therefore any element of the group would be selected and their order will be the prime number n [5] [6]. At the end of the protocol, the communicating parties end up with the same value K which is a point on the curve.…”
Section: Elliptic Curve Diffie-helmanmentioning
confidence: 99%
“…As a result of the increased popularity of multi-party or group key agreement protocol. In the article Ingemerson et al [13], Burmester and Desmedt [10], Steiner et al [12] and Becker and Willie [11]. The two party and three party key exchange is converted to multi party protocol under passive (eavesdropping) adversary, These three provide rigorous proofs of security.…”
Section: Group Key Agreement Protocolmentioning
confidence: 99%
See 3 more Smart Citations