Related Concepts
Definition
Key agreement schemes establish a shared secret between two or more parties. The versions described here are variants of Diffie–Hellman key agreement schemes.
Background
Classic Diffie–Hellman is an unauthenticated protocol to establish a shared secret. For a discussion of attacks and authentication, Diffie–Hellman Key Agreement.
Applications
In the elliptic curve analogue of the basic Diffie-Hellman key agreement scheme [4], two users A and B share domain parameters \(D = (q,\mbox{ FR},S,a,b,P,n,h)\) (Elliptic Curve Keys). A selects an integer \({d}_{A} {\in }_{R}[1,n - 1]\) and sends Q A = d A P to B. Similarly, B selects an integer \({d}_{B} {\in }_{R}[1,n - 1]\) and sends Q B = d B P to A. A computes \(K = {d}_{A}{Q}_{B} = {d}_{A}{d}_{B}P\), and B similarly computes K = d B Q A . The shared secret point Kis used to derive a secret key that can then be used to encrypt or...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
ANSI X9.63 (2001) Public key cryptography for the financial services industry: key agreement and key transport using elliptic curve cryptography. American National Standards Institute, Washington, DC
Blake-Wilson S, Menezes A (1999) Authenticated Diffie–Hellman key agreement protocols. Selected Areas in Cryptography—SAC ’98, Lecture Notes in Computer Science, vol 1556. Springer, Berlin, pp 339–361
Boyd C, Mathuria A (2003) Protocols for key establishment and authentication. Springer, New York
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans on Inf Theory 22:644–654
Diffie W, van Oorschot P, Wiener M (1992) Authentication and authenticated key exchanges. Design Codes Cryptogr 2:107–125
IEEE Std 1363-2000 (2000) IEEE standard specifications for public-key cryptography
ISO/IEC 15946-3 (2002) Information technology – security techniques – cryptographic techniques based on elliptic curves – Part 3: key establishment
Law L, Menezes A, Qu M, Solinas J, Vanstone S (2003) An efficient protocol for authenticated key agreement. Design Codes Cryptogr 28:119–134
SP 800-56A (2007) Special publication 800-56A, Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography. National Institute of Standards and Technology US Gaithersburg, Maryland
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Hankerson, D., Menezes, A. (2011). Elliptic Curve Key Agreement Schemes. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_247
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_247
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering