Downloads: 108 | Views: 155
Research Paper | Mathematics | India | Volume 3 Issue 6, June 2014
Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography
Vinod Kumar [37] | Adesh Kumari [2]
Abstract: In this paper; we are taken non singular elliptic curve which is depends on prime finite field. Accomplishment of existing public-key algorithms; comparable to Diffie-Hellman; using elliptic curves. In addition; the paper has been conventional two party authenticated key agreement protocol in elliptic curve cryptography (ECC). In this protocol; two users communicate to each other and generate secure session key. Furthermore; the paper shows the security analysis of this protocol on a secure communicated channel.
Keywords: Elliptic Curve Cryptography, Identity based Cryptosystem, Private Key generator Mutual Authentication
Edition: Volume 3 Issue 6, June 2014,
Pages: 587 - 589