Authenticated key exchange provably secure against the man-in-the-middle attack
From MaRDI portal
Publication:1601826
DOI10.1007/s00145-001-0017-4zbMath0994.94027OpenAlexW176909244MaRDI QIDQ1601826
Peter S. Gemmell, Anna M. Johnston
Publication date: 27 June 2002
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-001-0017-4
discrete logarithmman-in-the-middle attackauthenticated key exchangesignature schemeDiffie-Hellman problem\(q\)th-root problem
Related Items
Provably secure identity-based authenticated key agreement protocols with malicious private key generators ⋮ Trace formulae for irreducible polynomials over \(\mathbb F_P\) with minimal order roots in \(\mathbb F_{P^q}\)