Multi-parties key agreement protocol based on elliptic curve

The key agreement protocol is a shared key mechanism between two or more participants in a public channel.A multi key agreement protocol based on elliptic curve was designed by using the secure one-way function.The protocol was based on password authentication.The protocol designed can satisfy the s...

Full description

Saved in:
Bibliographic Details
Main Authors: Long GAO, Chun-ming TANG, Yong-qiang ZHANG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2016-05-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00056
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530371100901376
author Long GAO
Chun-ming TANG
Yong-qiang ZHANG
author_facet Long GAO
Chun-ming TANG
Yong-qiang ZHANG
author_sort Long GAO
collection DOAJ
description The key agreement protocol is a shared key mechanism between two or more participants in a public channel.A multi key agreement protocol based on elliptic curve was designed by using the secure one-way function.The protocol was based on password authentication.The protocol designed can satisfy the security characteristics of the key exchange protocol,and has high computing efficiency.
format Article
id doaj-art-5701f0c577b34a289e846e6a607a40d6
institution Kabale University
issn 2096-109X
language English
publishDate 2016-05-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-5701f0c577b34a289e846e6a607a40d62025-01-15T03:04:37ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-05-012778059545649Multi-parties key agreement protocol based on elliptic curveLong GAOChun-ming TANGYong-qiang ZHANGThe key agreement protocol is a shared key mechanism between two or more participants in a public channel.A multi key agreement protocol based on elliptic curve was designed by using the secure one-way function.The protocol was based on password authentication.The protocol designed can satisfy the security characteristics of the key exchange protocol,and has high computing efficiency.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00056multi-parties key agreement protocolelliptic curvehash functiondiscrete logarithm
spellingShingle Long GAO
Chun-ming TANG
Yong-qiang ZHANG
Multi-parties key agreement protocol based on elliptic curve
网络与信息安全学报
multi-parties key agreement protocol
elliptic curve
hash function
discrete logarithm
title Multi-parties key agreement protocol based on elliptic curve
title_full Multi-parties key agreement protocol based on elliptic curve
title_fullStr Multi-parties key agreement protocol based on elliptic curve
title_full_unstemmed Multi-parties key agreement protocol based on elliptic curve
title_short Multi-parties key agreement protocol based on elliptic curve
title_sort multi parties key agreement protocol based on elliptic curve
topic multi-parties key agreement protocol
elliptic curve
hash function
discrete logarithm
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00056
work_keys_str_mv AT longgao multipartieskeyagreementprotocolbasedonellipticcurve
AT chunmingtang multipartieskeyagreementprotocolbasedonellipticcurve
AT yongqiangzhang multipartieskeyagreementprotocolbasedonellipticcurve