A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
Joux's protocol  is a one round, tripartite key agreement protocol that is more bandwidthefficient than any previous three-party key agreement protocol. But it is insecure, suffering from a simple man-in-the-middle attack. This paper shows how to make Joux's protocol secure, presenting several tripartite, authenticated key agreement protocols that still require only one round of communication. A pass-optimal authenticated and key confirmed tripartite protocol that generalises thedoi:10.1007/978-3-540-40974-8_27 fatcat:tjml4y5zqvgodpfhvrxfepdfce