The company and each of its subsidiaries are in material agreement with the main agreements, licenses and agreements and, to the knowledge of the company and its subsidiaries, they have complied on all main agreements and have not violated it significantly. Authenticated key agreements allow users to determine session keys and communicate safely with others via a secure channel via session keys. This study examines the lower communication limits for key authenticated agreements with three parties and examines whether the sub-keys to generate a meeting key can be disclosed in the channel. Since two customers do not use a common secret key, they need the help of the server to authenticate their identities and exchange confidential and authenticated information on unsecured networks. However, if the security of the session key is based on asymmetrical cryptographic systems, the display of sub-keys cannot compromise the session key. Customers can directly replace sub-keys and reduce transfers. In addition, key authenticated agreements were developed using results derived from the lower limits of communication. Compared to related approaches, the proposed protocols had fewer transmissions and achieved the lower limits of communication. Quote: Lee T-F, Hwang T (2017) Key agreements authenticated by three parties for optimal communication. PLoS ONE 12 (3): e0174473. doi.org/10.1371/journal.pone.0174473 authenticated key agreements (authentication key agreements) allow users to exchange confidential and authenticated information via an unsecured network and create a common key that can be used to encrypt all communications via an unsecured channel. An AKA protocol guarantees to any communicating entity that wants to know the session keys the identity of other people for mutual authentication. With regard to mutual authentication, AKA protocols can be divided into two types: implicit mutual authentication and explicit mutual authentication.
An AKA protocol with implicit mutual authentication allows mutual authentication in subsequent communications. However, it is not possible to be sure how the participants in the minutes use the session key. On the other hand, an AKA protocol with explicit mutual authentication (AKA-MA) performs mutual authentication when executing the protocol . . For the minutes (g), at least two additional notifications are required for arguments similar to the protocol (b). Therefore, the protocol (g) cannot be implemented in five messages. For the protocol (a), after the third message, A receives a message sent by B and transmitted by S. A can authenticate B via S in accordance with Rule 6, receive a K2 sub-key of B and deduct the SK session key according to Les 3 and 7. Then, in Rule 4, A can create and expose an autha authenticator in the fourth message. On the other hand, after the fourth message, B receives a message sent by B and transmitted by S.