Key Agreement Protocols and their Security Analysis⋆Key Agreement Protocols • May 4th, 2022
Contract Type FiledMay 4th, 2022Abstract. This paper proposes new protocols for two goals: authenticated key agreement and authen- ticated key agreement with key confirmation in the asymmetric (public-key) setting. A formal model of distributed computing is provided, and a definition of the goals within this model supplied. The protocols proposed are then proven correct within this framework in the random oracle model. We em- phasize the relevance of these theoretical results to the security of systems used in practice. Practical implementation of the protocols is discussed. Such implementations are currently under consideration for standardization [2, 3, 21].