Welcome to the resource topic for 2005/451
Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols
Authors: Jue-Sam Chou, Yalin Chen, Ming-De YangAbstract:
In 2003, Boyd and Mao proposed two deniable authenticated key establishment
protocols using elliptic curve pairings for Internet protocols, one is based on
Diffie-Hellman key exchange and the other is based on Public-Key Encryption
approach. For the use of elliptic curve pairings, they declared that their schemes could
be more efficient than the existing Internet Key Exchange (IKE), nowadays. However
in this paper, we will show that both of Boyd-Mao¡¦s protocols suffer from the
key-Compromise Impersonation attack.
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .