Provably secure and efficient certificateless authenticated tripartite key agreement protocol
暂无分享,去创建一个
Zhong Chen | Fagen Li | Hu Xiong | Zhong Chen | Fagen Li | H. Xiong
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] Tsuyoshi Takagi,et al. An id-based non-interactive tripartite key agreement protocol with K-resilience , 2005, Communications and Computer Networks.
[3] Divya Nalla. ID-based tripartite key agreement with signatures , 2003, IACR Cryptol. ePrint Arch..
[4] Kyung-Ah Shim. Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols , 2003, IACR Cryptol. ePrint Arch..
[5] Sanggon Lee,et al. Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol , 2007, ICISS.
[6] Kwangjo Kim,et al. ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings , 2002, IACR Cryptol. ePrint Arch..
[7] Xiaoni Du,et al. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..
[8] Robert H. Deng,et al. Variations of Diffie-Hellman Problem , 2003, ICICS.
[9] Zhenfu Cao,et al. Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing , 2008, Int. J. Netw. Secur..
[10] Meng Gao,et al. An Efficient Certificateless Authenticated Tripartite Key Agreement Protocol , 2009, 2009 International Conference on Management and Service Science.
[11] Chu-Hsing Lin,et al. Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol , 2005, IACR Cryptol. ePrint Arch..
[12] Yong Yu,et al. Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[13] Kenneth G. Paterson,et al. Tripartite Authenticated Key Agreement Protocols from Pairings , 2003, IMACC.
[14] Burton S. Kaliski,et al. An unknown key-share attack on the MQV key agreement protocol , 2001, ACM Trans. Inf. Syst. Secur..
[15] David Jao,et al. A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols , 2009, INDOCRYPT.
[16] Josep Domingo-Ferrer,et al. Simulatable certificateless two-party authenticated key agreement protocol , 2010, Inf. Sci..
[17] Antoine Joux. A One Round Protocol for Tripartite Diffie-Hellman , 2000, ANTS.
[18] Zhong Chen,et al. Toward Pairing-Free Certificateless Authenticated Key Exchanges , 2011, ISC.
[19] Lei Zhang,et al. A New Provably Secure Certificateless Signature Scheme , 2008, 2008 IEEE International Conference on Communications.
[20] Sanggon Lee,et al. An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol , 2007, IACR Cryptol. ePrint Arch..
[21] Marko Hölbl,et al. Two proposed identity-based three-party authenticated key agreement protocols from pairings , 2010, Comput. Secur..
[22] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[23] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[24] Colin Boyd,et al. Strongly Secure Certificateless Key Agreement , 2009, Pairing.
[25] Kyung-Ah Shim,et al. Efficient one round tripartite authenticated key agreement protocol from Weil pairing , 2003 .
[26] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[27] Chik How Tan,et al. Certificateless Authenticated Two-Party Key Agreement Protocols , 2006, ASIAN.
[28] Kenneth G. Paterson,et al. Modular Security Proofs for Key Agreement Protocols , 2005, ASIACRYPT.
[29] Peter Nose. Security weaknesses of authenticated key agreement protocols , 2011, Inf. Process. Lett..
[30] Kyung-Ah Shim,et al. Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings , 2005, Appl. Math. Comput..
[31] Juan Manuel González Nieto,et al. Certificateless Key Agreement in the Standard Model , 2010, AISC.
[32] K. C. Reddy,et al. ID-based tripartite Authenticated Key Agreement Protocols from pairings , 2003, IACR Cryptol. ePrint Arch..