1993
DOI: 10.1049/el:19930666
|View full text |Cite
|
Sign up to set email alerts
|

Fully-fledged two-way public key authentication and key agreement for low-cost terminals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

1997
1997
2012
2012

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(16 citation statements)
references
References 1 publication
0
16
0
Order By: Relevance
“…The most efficient of these protocols is the two-pass protocol. The Beller-Yacobi two-pass protocol (BY-2) [Beller93] (typically) employs RSA encryption and either ElGamal or DSA signature methods plus a symmetric key method. It was designed to reduce the computational (# CPU cycles) cost for one of its participants (a smartcard or a wireless terminal) interacting with a higher power peer.…”
Section: Id a || Id B || E(key Pair N A )mentioning
confidence: 99%
“…The most efficient of these protocols is the two-pass protocol. The Beller-Yacobi two-pass protocol (BY-2) [Beller93] (typically) employs RSA encryption and either ElGamal or DSA signature methods plus a symmetric key method. It was designed to reduce the computational (# CPU cycles) cost for one of its participants (a smartcard or a wireless terminal) interacting with a higher power peer.…”
Section: Id a || Id B || E(key Pair N A )mentioning
confidence: 99%
“…Carlsen, [6], proposed some enhancements to the protocols in [2]. Xu and Wang , [19], improved the protocol in [3]. In addition, it is worth noting that the ASPeCT project [1] has systematicaHy studied the authentication framework based on the public-key cryptosystems and also discussed how to provide end-to-end services using trusted third parties in the third generation PCS.…”
Section: Introductionmentioning
confidence: 99%
“…Over time, several people have attempted to implement the direct mutual authentication between the portable and network using asymmetric cryptographic methods. BeHer et al, [2,3], proposed several authentication protocols based on Modular Square Root (MSR) and/or EIGamal signature scheme. Carlsen, [6], proposed some enhancements to the protocols in [2].…”
Section: Introductionmentioning
confidence: 99%
“…This work is further improved by Park et al [15]. Other key agreement and authentication protocols include the one by Beller and Yacobi [16]. A survey on key distribution and authentication for resource-starved devices in mobile environments is given in [17].…”
Section: Related Workmentioning
confidence: 99%