Back to Results
First PageMeta Content
Advantage / Adversary model / Diffie–Hellman problem / Random oracle / Cryptography / Cryptographic protocols / Cryptographic hash functions


Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem Hai Huang and Zhenfu Cao Department of Computer Science and Engineering, Shanghai Jiaotong University, 800 Dongchuan Road,
Add to Reading List

Document Date: 2008-11-27 03:18:55


Open Document

File Size: 206,36 KB

Share Result on Facebook

/

Facility

Shanghai Jiaotong University / /

IndustryTerm

probabilistic polynomial time algorithm / communication network / cryptographic protocol / /

Organization

Shanghai Jiaotong University / IDj / Zhenfu Cao Department of Computer Science and Engineering / IDi / /

Person

Hai Huang / /

Position

Forward / /

ProvinceOrState

Saskatchewan / /

Technology

twomessage AKE protocol / non-interactive Diffie-Hellman key exchange protocol / public key / secure AKE protocol / 4 Strongly Secure Authenticated Key Exchange Protocol / previous AKE protocols / PKI / AKE protocols / cryptographic protocol / proposed protocol Protocol / resulted protocol / MQV protocol / private key / simulation / probabilistic polynomial time algorithm / HMQV protocol / interactive AKE protocol / secure AKE protocols / AKE protocol / /

SocialTag