Generalization of Multiple Key Agreement Protocol based on Bilinear Pairings
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] Rainer A. Rueppel,et al. Weaknesses in some recent key agreement protocols , 1994 .
[3] Cheng-Chi Lee,et al. Improved Yen-Joye's authenticated multiple-key agreement protocol , 2002 .
[4] Chien-Lung Hsu,et al. Security of authenticated multiple-key agreement protocols , 1999 .
[5] Narn-Yih Lee,et al. Improved authentication key exchange protocol without using one-way hash function , 2004, OPSR.
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] TsengYuh-Min. Robust generalized MQV key agreement protocol without using one-way hash functions , 2002 .
[8] Zuhua Shao. Security of robust generalized MQV key agreement protocol without using one-way hash functions , 2003, Comput. Stand. Interfaces.
[9] Marc Joye,et al. Improved authenticated multiple-key agreement protocol , 1998 .
[10] Chien-Chih Wang,et al. Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings , 2008, Comput. Electr. Eng..
[11] Lein Harn,et al. Authenticated key agreement without using one-way hash functions , 2001 .
[12] Min-Ho Kim,et al. Improving the Novikov and Kiselev User Authentication Scheme , 2008, Int. J. Netw. Secur..
[13] Amit K. Awasthi,et al. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings , 2005, Int. J. Netw. Secur..
[14] Ren-Junn Hwang,et al. An enhanced authentication key exchange protocol , 2003, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003..
[15] Cheng-Chi Lee,et al. Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object , 2005, Int. J. Netw. Secur..
[16] Kyung-Ah Shim. Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions , 2007, Comput. Stand. Interfaces.