@inproceedings{cb0c80dc9ae54b5a876fdd882a1aa97d,
title = "Insider impersonation-MIM attack to tripartite key agreement scheme and an efficient protocol for multiple keys",
abstract = "In this paper, we introduce the definition of insider impersonation-MIM attack for tripartite key agreement schemes and show that almost all of the proposed schemes are not secure under this attack. We present a new protocol which is much more efficient than the existential secure protocol [13] in terms of computational efficiency and transmitted data size. Moreover, our protocol is the first scheme for multiple keys which means that not only a large number of keys but also various kinds of keys can be generated by applying our scheme.",
author = "Lihua Wang and Takeshi Okamoto and Tsuyoshi Takagi and Eiji Okamoto",
year = "2005",
doi = "10.1007/11596981_30",
language = "English",
isbn = "3540308199",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "198--203",
booktitle = "Computational Intelligence and Security - International Conference, CIS 2005, Proceedings",
address = "Germany",
note = "International Conference on Computational Intelligence and Security, CIS 2005 ; Conference date: 15-12-2005 Through 19-12-2005",
}