An Efficient Pairing-Free Certificateless Authenticated Two-Party Key Agreement Protocol Over Elliptic Curves
暂无分享,去创建一个
Shukor Abd Razak | Seyed Mohsen Ghoreishi | Ismail Fauzi Isnin | Hassan Chizari | S. Razak | Hassan Chizari | I. Isnin | S. Ghoreishi
[1] Guomin Yang,et al. Strongly secure certificateless key exchange without pairing , 2011, ASIACCS '11.
[2] Qiaoyan Wen,et al. A novel pairing-free certificateless authenticated key agreement protocol with provable security , 2013, Frontiers of Computer Science.
[3] Sahadeo Padhye,et al. An efficient certificateless two-party authenticated key agreement protocol , 2012, Comput. Math. Appl..
[4] Li Jianhua,et al. Two-party authenticated key agreement in certificateless public key cryptography , 2007 .
[5] Luminita Vasiu,et al. On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases , 2005, IACR Cryptol. ePrint Arch..
[6] Sahadeo Padhye,et al. A pairing‐free certificateless authenticated key agreement protocol , 2012, Int. J. Commun. Syst..
[7] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[8] Chik How Tan,et al. Certificateless Authenticated Two-Party Key Agreement Protocols , 2006, ASIAN.
[9] Futai Zhang,et al. Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing , 2009, 2009 International Conference on Computational Intelligence and Security.
[10] Rui Zhang,et al. A new two-round certificateless authenticated key agreement protocol without bilinear pairings , 2011, Mathematical and computer modelling.
[11] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[12] Joonsang Baek,et al. Certificateless Public Key Encryption Without Pairing , 2005, ISC.
[13] Colin Boyd,et al. Strongly Secure Certificateless Key Agreement , 2009, Pairing.
[14] Qiuliang Xu,et al. A Two-party certificateless authenticated key agreement protocol without pairing , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[15] Alfred Menezes,et al. Key Agreement Protocols and Their Security Analysis , 1997, IMACC.
[16] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[17] Charles Adams,et al. Understanding Public-Key Infra-structure: Concepts, Standards, and Deployment Con-siderations , 1999 .
[18] Liqun Chen,et al. Identity-based key agreement protocols from pairings , 2017, International Journal of Information Security.