International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 108

Research Paper | Mathematics | India | Volume 3 Issue 6, June 2014


Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography

Vinod Kumar [37] | Adesh Kumari [2]


Abstract: In this paper; we are taken non singular elliptic curve which is depends on prime finite field. Accomplishment of existing public-key algorithms; comparable to Diffie-Hellman; using elliptic curves. In addition; the paper has been conventional two party authenticated key agreement protocol in elliptic curve cryptography (ECC). In this protocol; two users communicate to each other and generate secure session key. Furthermore; the paper shows the security analysis of this protocol on a secure communicated channel.


Keywords: Elliptic Curve Cryptography, Identity based Cryptosystem, Private Key generator Mutual Authentication


Edition: Volume 3 Issue 6, June 2014,


Pages: 587 - 589


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Vinod Kumar, Adesh Kumari, "Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography", International Journal of Science and Research (IJSR), Volume 3 Issue 6, June 2014, pp. 587-589, https://www.ijsr.net/get_abstract.php?paper_id=2014159

Similar Articles with Keyword 'Elliptic'

Downloads: 0

Research Paper, Mathematics, India, Volume 11 Issue 5, May 2022

Pages: 871 - 872

Generalization of the Group Classification with Application of Elliptic Partial Differential Equations

Mani Sharma [3] | Dr. Chitra Singh [6]

Share this Article

Downloads: 8

Research Paper, Mathematics, Uganda, Volume 10 Issue 9, September 2021

Pages: 1662 - 1692

The Birch and Swinnerton-Dyer Conjecture

Adriko Bosco [5]

Share this Article
Top