Abstract
A new method is presented which enables key exchange without any previous secret agreement; a variant of it yields a signature scheme. This method requires less interactive computation then usual public key protocols, and also provides secrecy and authentication, so that its implementation is very attractive from a cost point of view. © 1990.
Original language | English |
---|---|
Pages (from-to) | 145-152 |
Journal | Computers and Security |
Volume | 9 |
Issue number | 2 |
DOIs | |
Publication status | Published - 1 Jan 1990 |
Keywords
- Authentication protocols
- Computer networks
- Cryptography
- Digital signatures
- Key exchange
- Network security