Outline. The paper is organised as follows. Section 2 deals with preliminaries. We show the weaknesses of the security scheme of [10–12] in Section 3. In Section 4, the proposed scheme is described. In Section 5, we give a formal proof of the security in the CK model. The computational complexity and the communication cost is explained in Section 6. Finally, conclusions are drawn in Section 7.
Appears in 4 contracts
Samples: Key Agreement, Key Agreement, Key Agreement