Efficient three-party authenticated key agreement protocol in certificateless cryptography
暂无分享,去创建一个
Zhong Chen | Zhiguang Qin | Hu Xiong | Zhong Chen | Z. Qin | H. Xiong
[1] Chu Wang,et al. Developing semantic business model for VO construction on semantic grid , 2008, Wuhan University Journal of Natural Sciences.
[2] Marko Hölbl,et al. Two proposed identity-based three-party authenticated key agreement protocols from pairings , 2010, Comput. Secur..
[3] Sanggon Lee,et al. An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol , 2007, IACR Cryptol. ePrint Arch..
[4] Kefei Chen,et al. ID-based tripartite key agreement protocol with pairings , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[5] Kenneth G. Paterson,et al. Tripartite Authenticated Key Agreement Protocols from Pairings , 2003, IMACC.
[6] Sanggon Lee,et al. Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol , 2007, ICISS.
[7] Kwangjo Kim,et al. ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings , 2002, IACR Cryptol. ePrint Arch..
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[10] Kyung-Ah Shim. Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols , 2003, IACR Cryptol. ePrint Arch..
[11] Chu-Hsing Lin,et al. Secure one-round tripartite authenticated key agreement protocol from Weil pairing , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[12] Lei Zhang,et al. A New Provably Secure Certificateless Signature Scheme , 2008, 2008 IEEE International Conference on Communications.
[13] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[14] Ratna Dutta,et al. Overview of Key Agreement Protocols , 2005, IACR Cryptol. ePrint Arch..
[15] Divya Nalla. ID-based tripartite key agreement with signatures , 2003, IACR Cryptol. ePrint Arch..
[16] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[17] Jianhua Li,et al. Two-party authenticated key agreement in certificateless public key cryptography , 2006, Wuhan University Journal of Natural Sciences.
[18] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[19] Dong Hoon Lee,et al. Efficient Certificateless Signature Schemes , 2007, ACNS.
[20] Kyung-Ah Shim,et al. Efficient one round tripartite authenticated key agreement protocol from Weil pairing , 2003 .
[21] Zhongliang Chen. Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols , 2003, IACR Cryptol. ePrint Arch..
[22] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[23] Chu-Hsing Lin,et al. Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol , 2005, IACR Cryptol. ePrint Arch..
[24] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[25] Shao Zu-hua,et al. Efficient authenticated key agreement protocol using self-certified public keys from pairings , 2008, Wuhan University Journal of Natural Sciences.
[26] SHAOZu-hua,et al. Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings , 2005 .
[27] Josep Domingo-Ferrer,et al. Simulatable certificateless two-party authenticated key agreement protocol , 2010, Inf. Sci..
[28] Antoine Joux. A One Round Protocol for Tripartite Diffie-Hellman , 2000, ANTS.
[29] Meng Gao,et al. An Efficient Certificateless Authenticated Tripartite Key Agreement Protocol , 2009, 2009 International Conference on Management and Service Science.
[30] Steven D. Galbraith,et al. Implementing the Tate Pairing , 2002, ANTS.
[31] Kyung-Ah Shim,et al. Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings , 2005, Appl. Math. Comput..
[32] Chik How Tan,et al. Certificateless Authenticated Two-Party Key Agreement Protocols , 2006, ASIAN.
[33] Juan Manuel González Nieto,et al. Certificateless Key Agreement in the Standard Model , 2010, AISC.
[34] K. C. Reddy,et al. ID-based tripartite Authenticated Key Agreement Protocols from pairings , 2003, IACR Cryptol. ePrint Arch..
[35] Wang Shengbao,et al. Efficient certificateless authenticated key agreement protocol from pairings , 2006, Wuhan University Journal of Natural Sciences.
[36] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[37] Li Jianhua,et al. Two-party authenticated key agreement in certificateless public key cryptography , 2007 .
[38] Tsuyoshi Takagi,et al. An id-based non-interactive tripartite key agreement protocol with K-resilience , 2005, Communications and Computer Networks.
[39] David Jao,et al. A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols , 2009, INDOCRYPT.
[40] Colin Boyd,et al. Strongly Secure Certificateless Key Agreement , 2009, Pairing.