Security Analysis. In this section, we will analyze the security of our proposed scheme. The main assumption for guarantee of security lies in: 1) The elliptic-curve Diffie–▇▇▇▇▇▇▇ problem is hard; 2) The hash function h ( ) is the pseudorandom permutation for key derivation; Our scheme can achieve the goal of user authentication and key agreement with great assurance and certainly can prevent the well-known attacks, such as the replay, parallel session, reflection, interleaving, and man-in-the-middle attacks.
Appears in 2 contracts
Sources: Password Authenticated Key Agreement Scheme, Password Authenticated Key Agreement Scheme