skip to main content
10.1145/1066677.1066755acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves

Published: 13 March 2005 Publication History

Abstract

Key agreement protocols are of fundamental importance for ensuring the confidentiality of communications between two (or more) parties over an insecure network. In this paper we review existing two-party protocols whose security rests upon the intractability of Diffie-Hellmann and Discrete Logarithm problems over elliptic curve groups. In addition, we propose a new two-party mutual authenticated key agreement protocol and collectively evaluate the security and performance of all the schemes considered. Elliptic curve techniques are used to minimise the computational workload on resource-constrained devices and to afford security levels with possibly fewer bits.

References

[1]
K. Al-Sultan, M. Saeb, M. Elmessiery, and U. A. Badawi. A new two-pass key agreement protocol. Proceedings of the IEEE Midwest 2003 Symp. on Circuits, Systems and Computers, 2003.]]
[2]
R. Ankney, D. Hohnson, and M. Matyas. The unified model. Contribution to X9F1, 1995.]]
[3]
ANSI-X9.62-1998. Public key cryptography for the financial services: The elliptic curve digital signature algorithm (ECDSA). American National Standards Institute, 1999.]]
[4]
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In 1st Conference on Computer and Communications Security, pages 62--73, 1993.]]
[5]
M. Bellare and P. Rogaway. Entity authentication and key distribution. In Proceedings of CRYPTO 1993, LNCS 773:232--249, 1994.]]
[6]
S. Blake-Wilson, D. Johnson, and A. Menezes. Key agreement protocols and their security analysis. In Proceedings of the 6th IMA Intl. Conf on Cryptography and Coding, LNCS 1355:30--45, 1997.]]
[7]
R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. In 30th STOC, pages 209--218, 1998.]]
[8]
R. Canetti and H. Krawczyk. Analysis of key exchange protocols and their use for building secure channels. Advances in Cryptology-EUROCRYPT 2001, pages 453--470, 2001.]]
[9]
Certicom. ECC challenge. http://www.certicom.com/resources/ecc_chall/challenge.html, 1997.]]
[10]
W. Diffie and M. Hellmann. New directions in cryptography. IEEE Transactions in Information Theory, pages 644--654, 1976.]]
[11]
FIPS-186-2. Digital signature standard. American National Standards Institute, 2000.]]
[12]
D. Hankerson, A. Menezes, and S. Vanstone. Guide to Elliptic Curve Cryptography. Springer Professional Computing, New York, 2004.]]
[13]
IEEE-P1363-2000. Standard specifications for public key cryptography. Institute of Electrical and Electronics Engineers, 2000.]]
[14]
IEEE-P1363a/D12. Draft standard specifications for public key cryptography-amendment 1: Additional techniques. Institute of Electrical and Electronics Engineers, 2003.]]
[15]
B. Kaliski. An unknown key share attack on the MQV key agreement protocol. ACM Transactions on Information and System Security, pages 36--49, 2001.]]
[16]
L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone. An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography, pages 28:119--134, 2003.]]
[17]
P. Leadbitter and N. Smart. Analysis of the insecurity of ECMQV with partially known nonces. Proceedings ISC 2003, LNCS 2851:240--251, 2003.]]
[18]
C. Lee, J. Lim, and J. Kim. An efficient and secure key agreement. IEEE p1363a draft, 1998.]]
[19]
T. Matsumoto, Y. Takashima, and H. Imai. On seeking smart public-key distribution systems. Transactions of IEICE, Vol. E69:99--106, 1986.]]
[20]
C. Mitchell, M. Ward, and P. Wilson. Key control in key agreement protocols. Electronic Letters, Vol. 34:980--981, 1998.]]
[21]
NIST-SP800-57. Recommendation for key management, part 1: General guideline. National Institute of Standards and Technology, 2003.]]
[22]
SEC1. Elliptic curve cryptography - version 1.0. Standards for Efficient Cryptography Group, 2000.]]
[23]
SEC2. Recommended elliptic curve domain parameters - version 1.0. Standards for Efficient Cryptography Group, 2000.]]
[24]
V. Shoup. On formal models for secure key exchange. Technical Report RZ 3120, IBM Research, 1999.]]
[25]
B. Song and K. Kim. Two-pass authenticated key agreement protocol with key confirmation. Progress in Cryptology - Indocrypt 2000, LNCS 1977:237--249, 2000.]]

Cited By

View all
  • (2024)Efficient Integration of Rate-Adaptive Reconciliation with Syndrome-Based Error Estimation and Subblock Confirmation for Quantum Key DistributionEntropy10.3390/e2601005326:1(53)Online publication date: 7-Jan-2024
  • (2022)A Fully Authenticated Diffie-Hellman Protocol and Its Application in WSNsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.317353617(1986-1999)Online publication date: 2022
  • (2022)TEE-based decentralized recommender systems: The raw data sharing redemption2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS)10.1109/IPDPS53621.2022.00050(447-458)Online publication date: May-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '05: Proceedings of the 2005 ACM symposium on Applied computing
March 2005
1814 pages
ISBN:1581139640
DOI:10.1145/1066677
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 March 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cryptography
  2. elliptic curves
  3. key agreement
  4. protocols

Qualifiers

  • Article

Conference

SAC05
Sponsor:
SAC05: The 2005 ACM Symposium on Applied Computing
March 13 - 17, 2005
New Mexico, Santa Fe

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Efficient Integration of Rate-Adaptive Reconciliation with Syndrome-Based Error Estimation and Subblock Confirmation for Quantum Key DistributionEntropy10.3390/e2601005326:1(53)Online publication date: 7-Jan-2024
  • (2022)A Fully Authenticated Diffie-Hellman Protocol and Its Application in WSNsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.317353617(1986-1999)Online publication date: 2022
  • (2022)TEE-based decentralized recommender systems: The raw data sharing redemption2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS)10.1109/IPDPS53621.2022.00050(447-458)Online publication date: May-2022
  • (2021)Survey on Asymmetric Cryptography Algorithms2021 International Conference on Electronic Information Engineering and Computer Science (EIECS)10.1109/EIECS53707.2021.9588106(464-469)Online publication date: 23-Sep-2021
  • (2021)Revisiting the ECM-KEEM protocol with Vedic multiplier for enhanced speed on FPGA platformsJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-021-03480-714:4(3475-3485)Online publication date: 3-Oct-2021
  • (2020)SeCon-NGProceedings of the 35th Annual ACM Symposium on Applied Computing10.1145/3341105.3374076(767-769)Online publication date: 30-Mar-2020
  • (2020) Cloud‐assisted elliptic curve password authenticated key exchange protocol for wearable healthcare monitoring system Concurrency and Computation: Practice and Experience10.1002/cpe.573434:9Online publication date: 12-May-2020
  • (2019)Efficient Hardware Implementation of 256-bit ECC Processor Over Prime Field2019 International Conference on Electrical, Computer and Communication Engineering (ECCE)10.1109/ECACE.2019.8679184(1-6)Online publication date: Feb-2019
  • (2019)Access control in user hierarchy based on elliptic curve cryptosystemInformation Sciences: an International Journal10.1016/j.ins.2007.08.001178:1(230-243)Online publication date: 6-Jan-2019
  • (2016)Multi-level authentication system for smart home-security analysis and implementation2016 International Conference on Inventive Computation Technologies (ICICT)10.1109/INVENTIVE.2016.7824790(1-7)Online publication date: Aug-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media