International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 108

Research Paper | Mathematics | India | Volume 3 Issue 6, June 2014


Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography

Vinod Kumar, Adesh Kumari


Abstract: In this paper; we are taken non singular elliptic curve which is depends on prime finite field. Accomplishment of existing public-key algorithms; comparable to Diffie-Hellman; using elliptic curves. In addition; the paper has been conventional two party authenticated key agreement protocol in elliptic curve cryptography (ECC). In this protocol; two users communicate to each other and generate secure session key. Furthermore; the paper shows the security analysis of this protocol on a secure communicated channel.


Keywords: Elliptic Curve Cryptography, Identity based Cryptosystem, Private Key generator Mutual Authentication


Edition: Volume 3 Issue 6, June 2014,


Pages: 587 - 589


How to Cite this Article?

Vinod Kumar, Adesh Kumari, "Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=2014159, Volume 3 Issue 6, June 2014, 587 - 589

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Elliptic'

Downloads: 8

Research Paper, Mathematics, Uganda, Volume 10 Issue 9, September 2021

Pages: 1662 - 1692

The Birch and Swinnerton-Dyer Conjecture

Adriko Bosco

Share this Article

Downloads: 108

Research Paper, Mathematics, India, Volume 6 Issue 4, April 2017

Pages: 1975 - 1977

The Triangular Libration Point L4 in the the Restricted Three Body Problem when the Bigger Primary is a Triaxial Rigid Body and Source of Radiation, Perturbation Effects Act in Coriolis and Centrifugal Forces

B. K. Mandal

Share this Article

Similar Articles with Keyword 'Curve'

Downloads: 61

Research Paper, Mathematics, China, Volume 9 Issue 7, July 2020

Pages: 549 - 556

Dualistic Wave: A Proposed Explanation of Zenos Paradox

Tao Jia

Share this Article

Downloads: 8

Research Paper, Mathematics, Uganda, Volume 10 Issue 9, September 2021

Pages: 1662 - 1692

The Birch and Swinnerton-Dyer Conjecture

Adriko Bosco

Share this Article

Similar Articles with Keyword 'Cryptography'

Downloads: 4

Informative Article, Mathematics, India, Volume 10 Issue 5, May 2021

Pages: 1216 - 1218

The Cyclic Group Used in 24-Hour Time Format Digital Clock

Divy Shah

Share this Article

Downloads: 108

Research Paper, Mathematics, Sri Lanka, Volume 4 Issue 12, December 2015

Pages: 1551 - 1558

Generation of Steiner Quadruple Systems

H. M. I. C. Herath, A. A. I. Perera, A. A. C. A. Jayathilake

Share this Article

Similar Articles with Keyword 'Identity'

Downloads: 1

Research Paper, Mathematics, India, Volume 10 Issue 8, August 2021

Pages: 1023 - 1028

Certain Transformation and Summation Formulae for Poly - Basic Hypergeometric Series

Dr. Brijesh Pratap Singh

Share this Article

Downloads: 90

Research Paper, Mathematics, India, Volume 3 Issue 8, August 2014

Pages: 1203 - 1207

Modulation and Parsevals Relation of Two Dimensional Fractional Sine Transform

V. D. Sharma, S. A. Khapre

Share this Article

Similar Articles with Keyword 'based'

Downloads: 146

Research Paper, Mathematics, India, Volume 6 Issue 11, November 2017

Pages: 1792 - 1796

A Study on Graph with Desmos through ICT in Diploma in Elementary Education of Tamil Nadu State Board

P. Charles Paul, G. Thulasi

Share this Article

Downloads: 61

Research Paper, Mathematics, China, Volume 9 Issue 7, July 2020

Pages: 549 - 556

Dualistic Wave: A Proposed Explanation of Zenos Paradox

Tao Jia

Share this Article

Similar Articles with Keyword 'Private'

Downloads: 36

Research Paper, Mathematics, Zambia, Volume 10 Issue 2, February 2021

Pages: 1590 - 1598

Pre-School Teacher Subject Matter Knowledge for Teaching Informal Geometry: A Pilot Study

Getrude Chimfwembe- Gondwe, Bentry Nkhata

Share this Article

Downloads: 143

Research Paper, Mathematics, India, Volume 4 Issue 2, February 2015

Pages: 605 - 608

An Identity-Based Secure Authenticated Framework by Using ECC in Cloud Computing

Nasheem Khan, Vinod Kumar, Adesh Kumari

Share this Article

Similar Articles with Keyword 'Key'

Downloads: 181 | Monthly Hits: ⮙2

Research Paper, Mathematics, China, Volume 9 Issue 7, July 2020

Pages: 1277 - 1281

Different Numerous Systems Correspond to Different Universes: Revealing the Secret behind Nikola Tesla Code of 3, 6, 9

Tao Jia

Share this Article

Downloads: 37

Research Paper, Mathematics, Libya, Volume 10 Issue 3, March 2021

Pages: 588 - 594

An Investigation and Study of Three-World Framework for Solving Algebraic Equations

Khayriyah Nasr Amhimmid Abunaejah

Share this Article

Similar Articles with Keyword 'generator'

Downloads: 2

Research Paper, Mathematics, India, Volume 10 Issue 9, September 2021

Pages: 1107 - 1111

Mathematical Model on Reliability with Three Units

Dr. Shruti Rani

Share this Article

Downloads: 105

Research Paper, Mathematics, China, Volume 5 Issue 6, June 2016

Pages: 1495 - 1499

The Stationary Distributions of Doubly Skew Ornstein-Uhlenbeck Processes and Markov-modulated Skew Ornstein-Uhlenbeck Processes

Danfeng Zhao, Ye Liu

Share this Article

Similar Articles with Keyword 'Mutual'

Downloads: 106

Research Paper, Mathematics, India, Volume 3 Issue 12, December 2014

Pages: 2576 - 2582

Unbiased Variance Estimators in System Reliability of Mixed Configuration Models

M. Reni Sagayaraj, A. Merceline Anita, A. Chandra Babu

Share this Article

Downloads: 113

Research Paper, Mathematics, India, Volume 8 Issue 12, December 2019

Pages: 1543 - 1545

Coloring of Field

Akshaya.G, Sudha Lakshmi.G

Share this Article
Top