@inproceedings{ba912c40fa934879b432343786dac3b9,
title = "Secure deniable authenticated key establishment for Internet protocols",
abstract = "In 2003, Boyd et al. have proposed two deniable authenticated key establishment protocols for Internet Key Exchange (IKE). However, both schemes have been broken by Chou et al. in 2005 due to their susceptibility to key-compromise impersonation (KCI) attack. In this paper, we put forward the improved variants of both Boyd et al. 's schemes in order to defeat the KCI attack. On top of justifying our improvements, we further present a detailed security analysis to ensure that the desired security attributes: deniability and authenticity remain preserved.",
author = "Lim, \{Meng Hui\} and Lee, \{Sang Gon\} and Youngho Park and Sangjae Moon",
year = "2008",
doi = "10.1109/ISA.2008.9",
language = "English",
isbn = "9780769531267",
series = "Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008",
pages = "3--6",
booktitle = "Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008",
note = "2nd International Conference on Information Security and Assurance, ISA 2008 ; Conference date: 24-04-2008 Through 26-04-2008",
}