"Harn and Lin proposed an authenticated key agreement without using one-way hash functions. It enables two
communicating parties to establish four common session keys
by sending two Diffie-Hellman public keys in a single round of
message exchange. However, to resist the known key attack, only
three common session keys can be used. Over the past years, all
researches study to establish four common session keys and all
four common session keys can be used. In this paper, we shall
extend these protocols to establish 36 common session keys in
each round of key agreement protocol. The proposed protocol is
based on bilinear pairings. Moreover, the security and efficiency
of our proposed protocol are presented."
Relation:
International Conference on E-Business and E-Government