Provably Secure and Password-Authenticated Hybrid Key Agreement Protocol in Two-realm with Privacy-Protection
暂无分享,去创建一个
[1] Tzonelih Hwang,et al. Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols , 2007, IEEE Transactions on Dependable and Secure Computing.
[2] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[3] Dong Hoon Lee,et al. Password-Authenticated Key Exchange between Clients with Different Passwords , 2002, ICICS.
[4] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[5] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[6] J. Schwinger. UNITARY OPERATOR BASES. , 1960, Proceedings of the National Academy of Sciences of the United States of America.
[7] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[8] Guihua Zeng,et al. Identity verification in quantum key distribution , 2000 .
[9] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[10] Sk Hafizul Islam,et al. Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps , 2014 .
[11] Xu Chen. A(3,3) visual cryptography scheme for authentication , 2013 .
[12] Li Gong,et al. Efficient network authentication protocols: Lower bounds and optimal implementations , 1995, Distributed Computing.
[13] Yuqing Zhang,et al. Cryptanalysis of a client-to-client password-authenticated key agreement protocol , 2008, IACR Cryptol. ePrint Arch..
[14] Hongfeng Zhu,et al. Flexible and Password-Authenticated Key Agreement Scheme Based on Chaotic Maps for Multiple Servers to Server Architecture , 2015, Wirel. Pers. Commun..
[15] D. J. Guan,et al. A practical protocol for three-party authenticated quantum key distribution , 2014, Quantum Information Processing.
[16] ZhuHongfeng. Flexible and Password-Authenticated Key Agreement Scheme Based on Chaotic Maps for Multiple Servers to Server Architecture , 2015 .
[17] Dongho Won,et al. Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords , 2004, ICCSA.
[18] Dong Hoon Lee,et al. EC2C-PAKA: An efficient client-to-client password-authenticated key agreement , 2007, Inf. Sci..
[19] Chien-Ming Chen,et al. On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol , 2016, J. Netw. Intell..