<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf18110</article-id><article-id pub-id-type="doi">10.15388/Informatica.2007.168</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>An Efficient Two-Party Identity-Based Key Exchange Protocol</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Tseng</surname><given-names>Yuh-Min</given-names></name><email xlink:href="mailto:ymtseng@cc.ncue.edu.tw">ymtseng@cc.ncue.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><aff id="j_INFORMATICA_aff_000">Department of Mathematics, National Changhua University of Education, Jin-De Campus, Chang-Hua City 500, Taiwan, R.O.C.</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2007</year></pub-date><volume>18</volume><issue>1</issue><fpage>125</fpage><lpage>136</lpage><history><date date-type="received"><day>01</day><month>04</month><year>2006</year></date></history><abstract><p>A key exchange (or agreement) protocol is designed to allow two entities establishing a session key to encrypt the communication data over an open network. In 1990, Gunther proposed an identity-based key exchange protocol based on the difficulty of computing a discrete logarithm problem. Afterwards, several improved protocols were proposed to reduce the number of communication steps and the communicational cost required by Gunther's protocol. This paper presents an efficient identity-based key exchange protocol based on the difficulty of computing a discrete logarithm problem. As compared with the previously proposed protocols, it has better performance in terms of the computational cost and the communication steps. The proposed key exchange protocol provides implicit key authentication as well as the desired security attributes of an authenticated key exchange protocol.</p></abstract><kwd-group><label>Keywords</label><kwd>authentication</kwd><kwd>identity-based</kwd><kwd>key exchange</kwd><kwd>security</kwd></kwd-group></article-meta></front></article>