A new method is presented which enables key exchange without any previous secret agreement; a variant of it yields a signature scheme. This method requires less interactive computation then usual public key protocols, and also provides secrecy and authentication, so that its implementation is very attractive from a cost point of view. © 1990.
|Journal||Computers and Security|
|Publication status||Published - 1 Jan 1990|
- Authentication protocols
- Computer networks
- Digital signatures
- Key exchange
- Network security