An eCK-Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[2] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[3] Atsushi Fujioka,et al. Strongly Secure Authenticated Key Exchange without NAXOS' Approach , 2009, IWSEC.
[4] Jean-Claude Bajard,et al. A New Security Model for Authenticated Key Agreement , 2010, SCN.
[5] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[6] Kristin E. Lauter,et al. Stronger Security of Authenticated Key Exchange , 2006, ProvSec.
[7] Mihir Bellare,et al. The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols , 2004, CRYPTO.
[8] Hugo Krawczyk,et al. Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead , 2010, ACNS.
[9] Berkant Ustaoglu,et al. Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS , 2008, Des. Codes Cryptogr..
[10] Ueli Maurer,et al. Diffie-Hellman Oracles , 1996, CRYPTO.
[11] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[12] Eiji Okamoto,et al. Key Distribution Systems Based on Identification Information , 1987, CRYPTO.
[13] Jooyoung Lee,et al. An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction , 2008, IACR Cryptol. ePrint Arch..
[14] Cas J. F. Cremers,et al. One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability , 2011, IACR Cryptol. ePrint Arch..
[15] David Pointcheval,et al. The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes , 2001, Public Key Cryptography.
[16] Zhenfu Cao,et al. Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem , 2008, IACR Cryptol. ePrint Arch..