An IBE-Based Authenticated Key Transfer Protocol on Elliptic Curves
暂无分享,去创建一个
[1] Marko Hölbl,et al. An improved two-party identity-based authenticated key agreement protocol using pairings , 2012, J. Comput. Syst. Sci..
[2] G. P. Biswas,et al. A novel and efficient lattice-based authenticated key exchange protocol in C-K model , 2018, Int. J. Commun. Syst..
[3] Yuh-Min Tseng,et al. An Efficient Two-Party Identity-Based Key Exchange Protocol , 2007, Informatica.
[4] G. P. Biswas,et al. Secure Computation on Cloud Storage: A Homomorphic Approach , 2015, J. Cases Inf. Technol..
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Kim-Kwang Raymond Choo. Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols , 2004, Int. J. Netw. Secur..
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Tao Jiang,et al. An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing , 2013, IEEE Transactions on Computers.
[9] Dong Hoon Lee,et al. One-Round Protocols for Two-Party Authenticated Key Exchange , 2004, ACNS.
[10] G. P. Biswas,et al. Securing Voice Call Transmission over Cellular Communication , 2015 .
[11] G. P. Biswas,et al. An ECC‐based authenticated group key exchange protocol in IBE framework , 2017, Int. J. Commun. Syst..
[12] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[13] G. P. Biswas,et al. Identity-Based/Attribute-Based cryptosystem using threshold value without Shamir's Secret Sharing , 2015, 2015 International Conference on Signal Processing, Computing and Control (ISPCC).
[14] G. P. Biswas,et al. A Secure Cloud Storage using ECC-Based Homomorphic Encryption , 2017, Int. J. Inf. Secur. Priv..
[15] Paulo S. L. M. Barreto,et al. A New Two-Party Identity-Based Authenticated Key Agreement , 2005, CT-RSA.
[16] G. P. Biswas,et al. Cryptanalysis of Wang et al.’s lattice-based key exchange protocol☆ , 2016 .
[17] G. P. Biswas,et al. Security weakness of a lattice-based key exchange protocol , 2018, 2018 4th International Conference on Recent Advances in Information Technology (RAIT).
[18] G. P. Biswas,et al. On Securing Bi- and Tri-partite Session Key Agreement Protocol Using IBE Framework , 2017, Wirel. Pers. Commun..
[19] Yun Liu,et al. A fault-tolerant group key agreement protocol exploiting dynamic setting , 2013, Int. J. Commun. Syst..
[20] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.