Key Agreement Using Statically Keyed Authenticators

  • Colin Boyd
  • Wenbo Mao
  • Kenneth G. Paterson
Conference paper

DOI: 10.1007/978-3-540-24852-1_18

Volume 3089 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Boyd C., Mao W., Paterson K.G. (2004) Key Agreement Using Statically Keyed Authenticators. In: Jakobsson M., Yung M., Zhou J. (eds) Applied Cryptography and Network Security. ACNS 2004. Lecture Notes in Computer Science, vol 3089. Springer, Berlin, Heidelberg

Abstract

A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. Application of the authenticators to Diffie-Hellman variants in appropriate groups leads to authenticated key agreement protocols which have attractive properties in comparison with other proven-secure protocols. We explore two key agreement protocols that result.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Colin Boyd
    • 1
  • Wenbo Mao
    • 2
  • Kenneth G. Paterson
    • 3
  1. 1.Information Security Research CentreQueensland University of TechnologyBrisbaneAustralia
  2. 2.Hewlett-Packard LaboratoriesStoke GiffordBristolUK
  3. 3.Information Security GroupRoyal Holloway, University of LondonEghamUK