Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Mathematics | India | Volume 3 Issue 6, June 2014

Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography

Vinod Kumar, Adesh Kumari

In this paper; we are taken non singular elliptic curve which is depends on prime finite field. Accomplishment of existing public-key algorithms; comparable to Diffie-Hellman; using elliptic curves. In addition; the paper has been conventional two party authenticated key agreement protocol in elliptic curve cryptography (ECC).In this protocol; two users communicate to each other and generate secure session key. Furthermore; the paper shows the security analysis of this protocol on a secure communicated channel.

Keywords: Elliptic Curve Cryptography, Identity based Cryptosystem, Private Key generator Mutual Authentication

Edition: Volume 3 Issue 6, June 2014

Pages: 587 - 589

Share this Article

How to Cite this Article?

Vinod Kumar, Adesh Kumari, "Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014159, Volume 3 Issue 6, June 2014, 587 - 589

40 PDF Views | 37 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Elliptic Curve Cryptography'

Research Paper, Mathematics, India, Volume 3 Issue 6, June 2014

Pages: 587 - 589

Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography

Vinod Kumar, Adesh Kumari

Share this Article

Research Paper, Mathematics, India, Volume 4 Issue 2, February 2015

Pages: 605 - 608

An Identity-Based Secure Authenticated Framework by Using ECC in Cloud Computing

Nasheem Khan, Vinod Kumar, Adesh Kumari

Share this Article

Similar Articles with Keyword 'Identity based Cryptosystem'

Research Paper, Mathematics, India, Volume 3 Issue 6, June 2014

Pages: 587 - 589

Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography

Vinod Kumar, Adesh Kumari

Share this Article

Research Paper, Mathematics, India, Volume 4 Issue 2, February 2015

Pages: 605 - 608

An Identity-Based Secure Authenticated Framework by Using ECC in Cloud Computing

Nasheem Khan, Vinod Kumar, Adesh Kumari

Share this Article
Top