Three-party authenticated key agreements for optimal communication.

PLoS One

Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan, ROC.

Published: August 2017

Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC5371375PMC
http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0174473PLOS

Publication Analysis

Top Keywords

authenticated key
16
key agreements
16
lower bounds
12
bounds communications
12
session key
12
three-party authenticated
8
key
8
session keys
8
session
5
agreements
4

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!