Identity-based key agreement protocol employing a symmetric balanced incomplete block design
暂无分享,去创建一个
Jian Shen | Ilyong Chung | Sangman Moh | Jian Shen | S. Moh | I. Chung
[1] Yuqing Zhang,et al. New ID-Based and Threshold Key Distribution Protocol in MANET Using a Multi-signcryption Scheme , 2009, 2009 International Conference on Computational Intelligence and Security.
[2] Joseph H. Silverman,et al. The arithmetic of elliptic curves , 1986, Graduate texts in mathematics.
[3] Alfred Menezes,et al. Key Agreement Protocols and Their Security Analysis , 1997, IMACC.
[4] Ratna Dutta,et al. Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract) , 2003, INDOCRYPT.
[5] Uta Wille,et al. Communication complexity of group key distribution , 1998, CCS '98.
[6] Chak-Kuen Wong,et al. A conference key distribution system , 1982, IEEE Trans. Inf. Theory.
[7] Qingshan Jiang,et al. An Identity-Based Group Key Agreement Protocol from Pairing , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[8] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[9] Wen-Guey Tzeng,et al. A Secure Fault-Tolerant Conference-Key Agreement Protocol , 2002, IEEE Trans. Computers.
[10] Yvo Desmedt,et al. A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.
[11] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[12] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.
[13] Rui Zhang,et al. Authenticated key distribution protocol in universal network , 2009, 2009 First International Conference on Future Information Networks.
[14] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[15] Alfred Menezes,et al. An Efficient Protocol for Authenticated Key Agreement , 2003, Des. Codes Cryptogr..
[16] M. Hussain,et al. Identifier based key distribution protocol for Wireless Sensor Networks , 2008, 2008 16th International Conference on Software, Telecommunications and Computer Networks.
[17] Gene Tsudik,et al. Group key agreement efficient in communication , 2004, IEEE Transactions on Computers.
[18] C. L. Liu,et al. Introduction to Combinatorial Mathematics. , 1971 .
[19] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[20] Xun Yi. Identity-based fault-tolerant conference key agreement , 2004, IEEE Transactions on Dependable and Secure Computing.
[21] Gene Tsudik,et al. New multiparty authentication services and key agreement protocols , 2000, IEEE Journal on Selected Areas in Communications.
[22] Gene Tsudik,et al. Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..
[23] William Stallings,et al. Cryptography and network security , 1998 .
[24] Chu-Hsing Lin,et al. Secure one-round tripartite authenticated key agreement protocol from Weil pairing , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[25] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[26] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[27] Sung-Ming Yen. Cryptanalysis of an authentication and key distribution protocol , 1999, IEEE Commun. Lett..
[28] Ilyong Chung,et al. The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design , 2006, Inf. Sci..