Research Paper | Mathematics | India | Volume 3 Issue 6, June 2014
Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography
Abstract: In this paper; we are taken non singular elliptic curve which is depends on prime finite field. Accomplishment of existing public-key algorithms; comparable to Diffie-Hellman; using elliptic curves. In addition; the paper has been conventional two party authenticated key agreement protocol in elliptic curve cryptography (ECC). In this protocol; two users communicate to each other and generate secure session key. Furthermore; the paper shows the security analysis of this protocol on a secure communicated channel.
Keywords: Elliptic Curve Cryptography, Identity based Cryptosystem, Private Key generator Mutual Authentication
Edition: Volume 3 Issue 6, June 2014,
Pages: 587 - 589
How to Cite this Article?
Vinod Kumar, Adesh Kumari, "Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography", International Journal of Science and Research (IJSR), Volume 3 Issue 6, June 2014, pp. 587-589, https://www.ijsr.net/get_abstract.php?paper_id=2014159
How to Share this Article?
Similar Articles with Keyword 'Elliptic'
Generalization of the Group Classification with Application of Elliptic Partial Differential Equations
The Birch and Swinnerton-Dyer Conjecture