Design and Security Analysis of AKE Protocol Based on Self-Certified Public Key

2009 
Authenticated key exchange (AKE) not only allows parties to compute the shared key but also ensures authenticity of the parties. A party can compute a shared key only if it is the one it claims to be. In this paper the authors present an AKE protocol based on self-certified public key, which combines Girault's self- certified public key theory and prove its security in the random oracle model. The proposed scheme is proved to be secure assuming the GDH problem is hard.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    9
    References
    0
    Citations
    NaN
    KQI
    []