Certificateless Authenticated Two-Party Key Agreement ProtocolsAuthenticated Key Agreement • April 6th, 2006
Contract Type FiledApril 6th, 2006– If A’s private key is compromised, an adversary can impersonate A, but the adversary should not be able to impersonate other entities, say B, to A.