An IBE-Based Authenticated Key Transfer Protocol on Elliptic Curves

[1]  Marko Hölbl,et al.  An improved two-party identity-based authenticated key agreement protocol using pairings , 2012, J. Comput. Syst. Sci..

[2]  G. P. Biswas,et al.  A novel and efficient lattice-based authenticated key exchange protocol in C-K model , 2018, Int. J. Commun. Syst..

[3]  Yuh-Min Tseng,et al.  An Efficient Two-Party Identity-Based Key Exchange Protocol , 2007, Informatica.

[4]  G. P. Biswas,et al.  Secure Computation on Cloud Storage: A Homomorphic Approach , 2015, J. Cases Inf. Technol..

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  Kim-Kwang Raymond Choo Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols , 2004, Int. J. Netw. Secur..

[7]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[8]  Tao Jiang,et al.  An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing , 2013, IEEE Transactions on Computers.

[9]  Dong Hoon Lee,et al.  One-Round Protocols for Two-Party Authenticated Key Exchange , 2004, ACNS.

[10]  G. P. Biswas,et al.  Securing Voice Call Transmission over Cellular Communication , 2015 .

[11]  G. P. Biswas,et al.  An ECC‐based authenticated group key exchange protocol in IBE framework , 2017, Int. J. Commun. Syst..

[12]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[13]  G. P. Biswas,et al.  Identity-Based/Attribute-Based cryptosystem using threshold value without Shamir's Secret Sharing , 2015, 2015 International Conference on Signal Processing, Computing and Control (ISPCC).

[14]  G. P. Biswas,et al.  A Secure Cloud Storage using ECC-Based Homomorphic Encryption , 2017, Int. J. Inf. Secur. Priv..

[15]  Paulo S. L. M. Barreto,et al.  A New Two-Party Identity-Based Authenticated Key Agreement , 2005, CT-RSA.

[16]  G. P. Biswas,et al.  Cryptanalysis of Wang et al.’s lattice-based key exchange protocol☆ , 2016 .

[17]  G. P. Biswas,et al.  Security weakness of a lattice-based key exchange protocol , 2018, 2018 4th International Conference on Recent Advances in Information Technology (RAIT).

[18]  G. P. Biswas,et al.  On Securing Bi- and Tri-partite Session Key Agreement Protocol Using IBE Framework , 2017, Wirel. Pers. Commun..

[19]  Yun Liu,et al.  A fault-tolerant group key agreement protocol exploiting dynamic setting , 2013, Int. J. Commun. Syst..

[20]  Mihir Bellare,et al.  Entity Authentication and Key Distribution , 1993, CRYPTO.