Multi-parties key agreement protocol based on elliptic curve
The key agreement protocol is a shared key mechanism between two or more participants in a public channel.A multi key agreement protocol based on elliptic curve was designed by using the secure one-way function.The protocol was based on password authentication.The protocol designed can satisfy the s...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2016-05-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00056 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850091941154258944 |
|---|---|
| author | Long GAO Chun-ming TANG Yong-qiang ZHANG |
| author_facet | Long GAO Chun-ming TANG Yong-qiang ZHANG |
| author_sort | Long GAO |
| collection | DOAJ |
| description | The key agreement protocol is a shared key mechanism between two or more participants in a public channel.A multi key agreement protocol based on elliptic curve was designed by using the secure one-way function.The protocol was based on password authentication.The protocol designed can satisfy the security characteristics of the key exchange protocol,and has high computing efficiency. |
| format | Article |
| id | doaj-art-5701f0c577b34a289e846e6a607a40d6 |
| institution | DOAJ |
| issn | 2096-109X |
| language | English |
| publishDate | 2016-05-01 |
| publisher | POSTS&TELECOM PRESS Co., LTD |
| record_format | Article |
| series | 网络与信息安全学报 |
| spelling | doaj-art-5701f0c577b34a289e846e6a607a40d62025-08-20T02:42:14ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-05-012778059545649Multi-parties key agreement protocol based on elliptic curveLong GAOChun-ming TANGYong-qiang ZHANGThe key agreement protocol is a shared key mechanism between two or more participants in a public channel.A multi key agreement protocol based on elliptic curve was designed by using the secure one-way function.The protocol was based on password authentication.The protocol designed can satisfy the security characteristics of the key exchange protocol,and has high computing efficiency.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00056multi-parties key agreement protocolelliptic curvehash functiondiscrete logarithm |
| spellingShingle | Long GAO Chun-ming TANG Yong-qiang ZHANG Multi-parties key agreement protocol based on elliptic curve 网络与信息安全学报 multi-parties key agreement protocol elliptic curve hash function discrete logarithm |
| title | Multi-parties key agreement protocol based on elliptic curve |
| title_full | Multi-parties key agreement protocol based on elliptic curve |
| title_fullStr | Multi-parties key agreement protocol based on elliptic curve |
| title_full_unstemmed | Multi-parties key agreement protocol based on elliptic curve |
| title_short | Multi-parties key agreement protocol based on elliptic curve |
| title_sort | multi parties key agreement protocol based on elliptic curve |
| topic | multi-parties key agreement protocol elliptic curve hash function discrete logarithm |
| url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00056 |
| work_keys_str_mv | AT longgao multipartieskeyagreementprotocolbasedonellipticcurve AT chunmingtang multipartieskeyagreementprotocolbasedonellipticcurve AT yongqiangzhang multipartieskeyagreementprotocolbasedonellipticcurve |