메뉴 건너뛰기




Volumn E86-A, Issue 5, 2003, Pages 1181-1189

On the Security of Girault Key Agreement Protocols against Active Attacks

Author keywords

Girault key agreement protocol; Reduction; Self certified public key

Indexed keywords

FUNCTIONS; NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 0141972489     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (1)

References (16)
  • 1
    • 0010364857 scopus 로고
    • Discrete logarithms and factoring
    • University of California, Computer Science Division (EECS)
    • E. Bach, "Discrete logarithms and factoring," Technical Report UCB/CSD 84/186, University of California, Computer Science Division (EECS), 1984.
    • (1984) Technical Report , vol.UCB-CSD 84-186
    • Bach, E.1
  • 2
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol.IT-22, no.6, pp.644-654, 1974.
    • (1974) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 3
    • 84937570422 scopus 로고
    • Self-certified public keys
    • Advances in Cryptology-eurocrypt'91 Springer-Verlag, Berlin
    • M. Girault, "Self-certified public keys," Advances in Cryptology-Eurocrypt'91, LNCS 547, pp.490-497, Springer-Verlag, Berlin, 1991.
    • (1991) LNCS , vol.547 , pp. 490-497
    • Girault, M.1
  • 4
    • 0026172323 scopus 로고
    • Average case completeness
    • Y. Gurevich, "Average case completeness," J. Comput. Syst. Sci., vol.42, pp.346-398, 1991.
    • (1991) J. Comput. Syst. Sci. , vol.42 , pp. 346-398
    • Gurevich, Y.1
  • 5
    • 0035120027 scopus 로고    scopus 로고
    • On the security of the Okamoto-Tanaka ID-based key exchange scheme against active attacks
    • Jan.
    • S.J. Kim, M. Mambo, T. Okamoto, H. Shizuya, M. Tada, and D.H. Won, "On the security of the Okamoto-Tanaka ID-based key exchange scheme against active attacks," IEICE Trans. Fundamentals, vol.E84-A, no.l, pp.231-238, Jan. 2001.
    • (2001) IEICE Trans. Fundamentals , vol.E84-A , Issue.1 , pp. 231-238
    • Kim, S.J.1    Mambo, M.2    Okamoto, T.3    Shizuya, H.4    Tada, M.5    Won, D.H.6
  • 6
    • 0032661954 scopus 로고    scopus 로고
    • A note on the complexity of breaking Okamoto-Tanaka ID-based key exchange scheme
    • Jan.
    • M. Mambo and H. Shizuya, "A note on the complexity of breaking Okamoto-Tanaka ID-based key exchange scheme," IEICE Trans. Fundamentals, vol.E82-A, no.l, pp.77-80, Jan. 1999.
    • (1999) IEICE Trans. Fundamentals , vol.E82-A , Issue.1 , pp. 77-80
    • Mambo, M.1    Shizuya, H.2
  • 7
    • 0024139776 scopus 로고
    • A key distribution system equivalent to factoring
    • K.S. McCurley, "A key distribution system equivalent to factoring," J. Cryptology, vol.1, pp.95-105, 1988.
    • (1988) J. Cryptology , vol.1 , pp. 95-105
    • McCurley, K.S.1
  • 9
    • 0024665726 scopus 로고
    • Key distribution system based on identification information
    • E. Okamoto and K. Tanaka, "Key distribution system based on identification information," IEEE J. Sel. Areas Commun., vol.7, pp.481-485, 1989.
    • (1989) IEEE J. Sel. Areas Commun. , vol.7 , pp. 481-485
    • Okamoto, E.1    Tanaka, K.2
  • 11
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R.L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, vol.21, no.2, pp.120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 12
    • 0028466586 scopus 로고
    • Modern key agreement techniques
    • July
    • R.A. Rueppel and P.C. van Oorschot, "Modern key agreement techniques," Computer Communications, vol.17 no.7, pp.458-465, July 1994.
    • (1994) Computer Communications , vol.17 , Issue.7 , pp. 458-465
    • Rueppel, R.A.1    Van Oorschot, P.C.2
  • 13
    • 84957353267 scopus 로고
    • Relationships among the computational powers of breaking discrete log cryptosystems
    • Springer-Verlag
    • K. Sakurai and H. Shizuya, "Relationships among the computational powers of breaking discrete log cryptosystems," Advances in Cryptology-Eurocrypt'95 LNCS 921, pp.341-355, Springer-Verlag, 1995. J. Cryptology, vol.11, pp.29-43, 1998.
    • (1995) Advances in Cryptology-Eurocrypt'95 LNCS , vol.921 , pp. 341-355
    • Sakurai, K.1    Shizuya, H.2
  • 14
    • 0003610767 scopus 로고    scopus 로고
    • K. Sakurai and H. Shizuya, "Relationships among the computational powers of breaking discrete log cryptosystems," Advances in Cryptology-Eurocrypt'95 LNCS 921, pp.341-355, Springer-Verlag, 1995. J. Cryptology, vol.11, pp.29-43, 1998.
    • (1998) J. Cryptology , vol.11 , pp. 29-43
  • 15
    • 0009435059 scopus 로고
    • Composite Diffie-Hellman public-key generating systems are hard to break
    • Computer Science Department, Technion-Israel Institute of Technology
    • Z. Shmuely, "Composite Diffie-Hellman public-key generating systems are hard to break," Technical Report, no.356, Computer Science Department, Technion-Israel Institute of Technology, 1985.
    • (1985) Technical Report , vol.356
    • Shmuely, Z.1
  • 16
    • 0141911098 scopus 로고
    • Reduction among number theoretic problems
    • H. Woll, "Reduction among number theoretic problems," Inf. Comput., vol.72, pp.167-179, 1987.
    • (1987) Inf. Comput. , vol.72 , pp. 167-179
    • Woll, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.