Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings
暂无分享,去创建一个
[1] Michael Scott,et al. Implementing Cryptographic Pairings on Smartcards , 2006, CHES.
[2] Yuh-Min Tseng,et al. An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices , 2010, Comput. J..
[3] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[4] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[5] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[6] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[7] Hua Zhang,et al. A novel remote user authentication and key agreement scheme for mobile client-server environment , 2013 .
[8] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[9] Yuh-Min Tseng,et al. A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards , 2008, Informatica.
[10] Ashutosh Saxena,et al. A novel remote user authentication scheme using bilinear pairings , 2006, Comput. Secur..
[11] Yuh-Min Tseng,et al. An efficient user authentication and key exchange protocol for mobile client-server environment , 2010, Comput. Networks.
[12] Atul Negi,et al. Cryptanalysis of recently proposed Remote User Authentication Schemes , 2006, IACR Cryptol. ePrint Arch..
[13] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[14] Jia-Lun Tsai. Comments on a novel user authentication and key agreement scheme , 2014, IACR Cryptol. ePrint Arch..
[15] E-J. Yoon,et al. A new efficient id-based user authentication and key exchange protocol for mobile client-server environment , 2010, 2010 IEEE International Conference on Wireless Information Technology and Systems.
[16] Kazuhiro Yokoyama,et al. Elliptic curve cryptosystem , 2000 .
[17] Dongho Won,et al. DDH-based group key agreement in a mobile environment , 2005, J. Syst. Softw..
[18] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[19] Debiao He,et al. An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings , 2012, Ad Hoc Networks.
[20] Yuh-Min Tseng,et al. Towards generalized ID-based user authentication for mobile multi-server environment , 2012, Int. J. Commun. Syst..
[21] Jia-Lun Tsai,et al. ID-Based Aggregate Proxy Signature Scheme Realizing Warrant-Based Delegation , 2013, J. Inf. Sci. Eng..
[22] Duncan S. Wong,et al. Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices , 2001, ASIACRYPT.
[23] Qiaoyan Wen,et al. An Efficient Identity-Based Short Signature Scheme from Bilinear Pairings , 2007 .
[24] Markus Jakobsson,et al. Mutual Authentication for Low-Power Mobile Devices , 2002, Financial Cryptography.
[25] Cheng-Chi Lee,et al. A new authenticated group key agreement in a mobile environment , 2009, Ann. des Télécommunications.
[26] Amit K. Awasthi. An improved remote user authentication scheme with smart cards using bilinear pairings , 2007 .
[27] Ashutosh Saxena,et al. An improved bilinear pairing based remote user authentication scheme , 2009, Comput. Stand. Interfaces.
[28] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[29] Jia-Lun Tsai. A novel authenticated group key agreement protocol for mobile environment , 2011, Ann. des Télécommunications.