Secure certificateless-based authenticated key agreement protocol in the client-server setting
暂无分享,去创建一个
[1] Stephen Farrell,et al. Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.
[2] Li Jianhua,et al. Two-party authenticated key agreement in certificateless public key cryptography , 2007 .
[3] Jean-Jacques Quisquater,et al. On Constructing Certificateless Cryptosystems from Identity Based Encryption , 2006, Public Key Cryptography.
[4] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[5] Alfred Menezes,et al. Key Agreement Protocols and Their Security Analysis , 1997, IMACC.
[6] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[7] Dong Hoon Lee,et al. Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles) , 2007, Pairing.
[8] Colleen M. Swanson,et al. Security in Key Agreement: Two-Party Certificateless Schemes , 2008 .
[9] Wang Shengbao,et al. Efficient certificateless authenticated key agreement protocol from pairings , 2006, Wuhan University Journal of Natural Sciences.
[10] Wang Sheng. Provably Secure Identity-Based Authenticated Key Agreement Protocols in the Standard Model , 2007 .
[11] Chik How Tan,et al. Certificateless Authenticated Two-Party Key Agreement Protocols , 2006, ASIAN.
[12] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[13] Zhenfu Cao,et al. Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing , 2008, Int. J. Netw. Secur..
[14] Chris J. Mitchell,et al. Key control in key agreement protocols , 1998 .