Date Added: Nov 2009
This paper addresses the problem of multiparty user authentication and key agreement whereby a party gains assurance of the identity of other parties involved in a protocol for preventing impersonation and unauthorized access. Its scheme utilizes the idea of Buttyan, Nagy proposed multi-party challenge -response protocol. The proposed protocol allows each participant to directly verify all the other parties that were alive during the protocol run. Its protocol uses minimum number of messages required to solve the multi-party entity authentication problem. Specifically, it constructs a multiparty secret key generation scheme which employs simple XOR operations. The authenticity of the protocol is assured by a digital signature scheme. Security attributes of protocol are presented and analyzed as well.