Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings
暂无分享,去创建一个
Zhoujun Li | Yi Mu | Hua Guo | Xiyong Zhang
[1] Jin Li,et al. Towards Security Two-part Authenticated Key Agreement Protocols , 2005, IACR Cryptol. ePrint Arch..
[2] Liqun Chen,et al. Identity-based key agreement protocols from pairings , 2017, International Journal of Information Security.
[3] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[4] Liqun Chen,et al. On security proof of McCullagh?Barreto's key agreement protocol and its variants , 2007, Int. J. Secur. Networks.
[5] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[6] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[7] Hyang-Sook Lee,et al. IDENTITY BASED AUTHENTICATED KEY AGREEMENT FROM PAIRINGS , 2005 .
[8] Colin Boyd,et al. Cryptography and Coding , 1995, Lecture Notes in Computer Science.
[9] Kyung-Ah Shim. Efficient ID-based authenticated key agreement protocol based on Weil pairing , 2003 .
[10] Luminita Vasiu,et al. On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases , 2005, IACR Cryptol. ePrint Arch..
[11] Nigel P. Smart,et al. AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL BASED ON THE WEIL PAIRING , 2001 .
[12] Qiang Tang,et al. Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings , 2006, ISPEC.
[13] Guohong Xie,et al. An ID-Based Key Agreement Scheme from pairing , 2005, IACR Cryptol. ePrint Arch..
[14] M. Kasahara,et al. A New Traitor Tracing , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[15] Paulo S. L. M. Barreto,et al. A New Two-Party Identity-Based Authenticated Key Agreement , 2005, CT-RSA.
[16] Alfred Menezes,et al. Topics in Cryptology – CT-RSA 2005 , 2005 .
[17] Masao Kasahara,et al. ID based Cryptosystems with Pairing on Elliptic Curve , 2003, IACR Cryptol. ePrint Arch..
[18] Alfred Menezes,et al. Key Agreement Protocols and Their Security Analysis , 1997, IMACC.
[19] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[20] Liqun Chen,et al. Identity based authenticated key agreement protocols from pairings , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..