@article{1130, author = {Mohamed Nabil, Yasmine Abouelseoud, Galal Elkobrosy, Amr Abdelrazek}, title = {New Key Agreement Protocols Providing Explicit Authentication}, journal = {Journal of Information Security Research}, year = {2013}, volume = {4}, number = {1}, doi = {}, url = {http://www.dline.info/jisr/fulltext/v4n1/2.pdf}, abstract = {Establishing a common secret key between two or more entities is an essential component of any security system. In this paper, the problem of establishing a shared session key in an authenticated way is addressed. The proposed key agreement protocols support explicit authentication. The protocols are designed in such a way that permits a trusted third party, such as a firewall, to verify the identities of the parties involved in a key agreement session. This is reduces the computational burden at the end-user side, which can be a device with limited capabilities. The proposed protocols have been implemented, based on the PBC library provided by Stanford University, to ensure their correctness, the ease of their practical use and their timeliness. A comparative study of the proposed protocols to other protocols in literature revealed the superiority of the proposed protocols from the security viewpoint at the cost of an acceptable increase in the computational burden.}, }