{"title":"基于数字认证的三方密钥协议","authors":"Junbing Li, Wei Ji","doi":"10.1109/CIS.2010.83","DOIUrl":null,"url":null,"abstract":"This paper first introduces the characteristic set of tripartite key agreement protocols. Then the relationship between the characteristic set and the security of a tripartite key agreement protocol is discussed. Because all present tripartite key agreement protocols are insecure, new protocols based on digital certification are proposed. The security and efficiency of the new protocols are discussed.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Tripartite Key Agreement Protocols Based on Digital Certification\",\"authors\":\"Junbing Li, Wei Ji\",\"doi\":\"10.1109/CIS.2010.83\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper first introduces the characteristic set of tripartite key agreement protocols. Then the relationship between the characteristic set and the security of a tripartite key agreement protocol is discussed. Because all present tripartite key agreement protocols are insecure, new protocols based on digital certification are proposed. The security and efficiency of the new protocols are discussed.\",\"PeriodicalId\":420515,\"journal\":{\"name\":\"2010 International Conference on Computational Intelligence and Security\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Computational Intelligence and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS.2010.83\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2010.83","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Tripartite Key Agreement Protocols Based on Digital Certification
This paper first introduces the characteristic set of tripartite key agreement protocols. Then the relationship between the characteristic set and the security of a tripartite key agreement protocol is discussed. Because all present tripartite key agreement protocols are insecure, new protocols based on digital certification are proposed. The security and efficiency of the new protocols are discussed.