An enhanced certificateless authenticated key agreement protocol
暂无分享,去创建一个
[1] Qiuliang Xu,et al. On the Security of Certificateless Authenticated Key Agreement Protocol (CL-AK) for Grid Computing , 2009, 2009 Fourth ChinaGrid Annual Conference.
[2] Alfred Menezes,et al. Key Agreement Protocols and Their Security Analysis , 1997, IMACC.
[3] Shao Zu-hua,et al. Efficient authenticated key agreement protocol using self-certified public keys from pairings , 2008, Wuhan University Journal of Natural Sciences.
[4] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[5] Colin Boyd,et al. Strongly Secure Certificateless Key Agreement , 2009, Pairing.
[6] R. W. Younglove,et al. Public key infrastructure. How it works , 2001 .
[7] Wang Shengbao,et al. Efficient certificateless authenticated key agreement protocol from pairings , 2006, Wuhan University Journal of Natural Sciences.
[8] Liang Xia,et al. Breaking and repairing the certificateless key agreement protocol from ASIAN 2006 , 2008, Wuhan University Journal of Natural Sciences.
[9] Zhenfu Cao,et al. Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing , 2008, Int. J. Netw. Secur..
[10] Colleen M. Swanson,et al. Security in Key Agreement: Two-Party Certificateless Schemes , 2008 .
[11] Qiuliang Xu,et al. Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme , 2009, 2009 International Conference on Management of e-Commerce and e-Government.
[12] Futai Zhang,et al. Secure Certificateless Public Key Encryption without Redundancy , 2008, IACR Cryptol. ePrint Arch..
[13] Qiuliang Xu,et al. Secure and efficient two-party certificateless authenticated key agreement protocol , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[14] Kenneth G. Paterson,et al. A comparison between traditional public key infrastructures and identity-based cryptography , 2003, Inf. Secur. Tech. Rep..
[15] Josep Domingo-Ferrer,et al. Simulatable certificateless two-party authenticated key agreement protocol , 2010, Inf. Sci..
[16] Quan Yuan,et al. A New Efficient ID-Based Authenticated Key Agreement Protocol , 2005, IACR Cryptol. ePrint Arch..
[17] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[18] Jean-Jacques Quisquater,et al. On Constructing Certificateless Cryptosystems from Identity Based Encryption , 2006, Public Key Cryptography.
[19] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[20] Jianhua Li,et al. Two-party authenticated key agreement in certificateless public key cryptography , 2006, Wuhan University Journal of Natural Sciences.
[21] Gerhard Frey,et al. The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems , 1999, IEEE Trans. Inf. Theory.
[22] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[23] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.
[24] Chik How Tan,et al. Certificateless Authenticated Two-Party Key Agreement Protocols , 2006, ASIAN.