메뉴 건너뛰기




Volumn 3364 LNCS, Issue , 2005, Pages 255-271

Deniable authenticated key establishment for Internet Protocols

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET; MODULAR CONSTRUCTION; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 33645662264     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11542322_31     Document Type: Conference Paper
Times cited : (18)

References (36)
  • 2
    • 35248835023 scopus 로고    scopus 로고
    • Constructing elliptic curves with prescribed embedding degrees
    • Security in communication networks - SCN'2002, Springer-Verlag
    • P.S.L.M. Barreto, B. Lynn, and M. Scott. Constructing elliptic curves with prescribed embedding degrees. In Security in communication networks - SCN'2002, volume 2576 of LNCS, pages 263-273. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2576 , pp. 263-273
    • Barreto, P.S.L.M.1    Lynn, B.2    Scott, M.3
  • 3
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols
    • ACM Press, Full version
    • M. Bellare, R. Canetti, and H. Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the thirtieth annual ACM symposium on Theory of computing, pages 419-428. ACM Press, 1998. Full version at http://www-cse.ucsd.edu/users/mihir/papers/key-distribution.html.
    • (1998) Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 4
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Springer-Verlag, Full version
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In Advances in Cryptology - CRYPTO'93, pages 232-249. Springer-Verlag, 1993. Full version at www-cse.ucsd.edu/users/mihir.
    • (1993) Advances in Cryptology - CRYPTO'93 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • J. Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference. Springer Verlag
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In J. Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, volume 2139 of LNCS, pages 213-229. Springer Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • full version of [6]
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. SIAM J. Computing, 32(3):586-615, 2003. http://www.crypto.stanford.edu/~dabo/abstracts/ibe.html, full version of [6].
    • (2003) SIAM J. Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 8
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • C. Boyd, editor, Advances in Cryptology - ASIACRYPT 2001. Springer-Verlag
    • D. Boneh, H. Shacham, and B. Lynn. Short signatures from the Weil pairing. In C. Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, volume 2248 of LNCS, pages 514-532. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Shacham, H.2    Lynn, B.3
  • 9
    • 0034227286 scopus 로고    scopus 로고
    • Methods, and protocols for secure key negotiation using IKE
    • July/August
    • M.S. Borella, Methods, and protocols for secure key negotiation using IKE. IEEE Network, pages 18-29, July/August 2000.
    • (2000) IEEE Network , pp. 18-29
    • Borella, M.S.1
  • 11
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Advances in Cryptology - Eurocrypt 2001. Springer-Verlag
    • R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Advances in Cryptology - Eurocrypt 2001, volume 2045 of LNCS, pages 453-474. Springer-Verlag, 2001. http://eprint.iacr.org/2001/040.pg.gz.
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 13
    • 0034804626 scopus 로고    scopus 로고
    • An architecture for the Internet Key Exchange protocol
    • P.-C. Cheng. An architecture for the Internet Key Exchange protocol. IBM Systems Journal, 40(3):721-745, 2001.
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 721-745
    • Cheng, P.-C.1
  • 15
    • 27744571440 scopus 로고    scopus 로고
    • Practical non-interactive key distribution based on pairings
    • R. Dupont and A. Enge. Practical non-interactive key distribution based on pairings. Cryptology ePrint Archive, Report 2002/136, 2002. http://eprint.iacr.org/.
    • (2002) Cryptology EPrint Archive, Report , vol.2002 , Issue.136
    • Dupont, R.1    Enge, A.2
  • 16
    • 23944499936 scopus 로고    scopus 로고
    • Building curves with arbitrary small MOV degree over finite prime fields
    • R. Dupont, A. Enge, and F. Morain. Building curves with arbitrary small MOV degree over finite prime fields. Cryptology ePrint Archive, Report 2002/094, 2002. http://eprint.iacr.org/.
    • (2002) Cryptology EPrint Archive, Report , vol.2002 , Issue.94
    • Dupont, R.1    Enge, A.2    Morain, F.3
  • 18
    • 84946832010 scopus 로고    scopus 로고
    • Supersingular curves in cryptography
    • C. Boyd, editor, Proceedings of AsiaCrypt 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security. Springer-Verlag
    • S. D. Galbraith. Supersingular curves in cryptography. In C. Boyd, editor, Proceedings of AsiaCrypt 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, volume 2248 of LNCS, pages 495-513. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2248 , pp. 495-513
    • Galbraith, S.D.1
  • 19
    • 82955246861 scopus 로고    scopus 로고
    • Implementing the Tate pairing
    • Algorithmic Number Theory 5th International Symposium, ANTS-V. Springer-Verlag
    • S. D. Galbraith, K. Harrison, and D. Soldera. Implementing the Tate pairing. In Algorithmic Number Theory 5th International Symposium, ANTS-V, volume 2369 of LNCS, pages 324-337. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2369 , pp. 324-337
    • Galbraith, S.D.1    Harrison, K.2    Soldera, D.3
  • 20
    • 84937570422 scopus 로고
    • Self-certified public keys
    • LNCS. Springer-Verlag
    • M. Girault. Self-certified public keys. In Advances in Cryptology - Eurocrypt 1991, LNCS, pages 490-497. Springer-Verlag, 1991.
    • (1991) Advances in Cryptology - Eurocrypt 1991 , pp. 490-497
    • Girault, M.1
  • 25
    • 0029719080 scopus 로고    scopus 로고
    • Some new attacks upon security protocols
    • . IEEE Computer Society Press
    • G. Lowe. Some new attacks upon security protocols. In 9th IEEE Computer Security Foundations Workshop, pages 162-169. IEEE Computer Society Press, 1996.
    • (1996) 9th IEEE Computer Security Foundations Workshop , pp. 162-169
    • Lowe, G.1
  • 28
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, December 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 29
    • 1642414982 scopus 로고    scopus 로고
    • Cryptography from pairings: A snapshot of current research
    • K.G. Paterson. Cryptography from pairings: A snapshot of current research. Information Security Technical Report, 7(3):41-54, 2002. http://www.isg.rhul.ac.uk/~kp/pairings.ps.
    • (2002) Information Security Technical Report , vol.7 , Issue.3 , pp. 41-54
    • Paterson, K.G.1
  • 30
    • 0034315111 scopus 로고    scopus 로고
    • Key exchange in IPSec: Analysis of IKE
    • November-December
    • R. Perlman and C. Kaufman. Key exchange in IPSec: Analysis of IKE. IEEE Internet Computing, pages 50-56, November-December 2000.
    • (2000) IEEE Internet Computing , pp. 50-56
    • Perlman, R.1    Kaufman, C.2
  • 31
    • 0037611030 scopus 로고    scopus 로고
    • A note on Girault's self-certified model
    • S. Saeednia. A note on Girault's self-certified model. Information Processing Letters, 86:323-327, 2003.
    • (2003) Information Processing Letters , vol.86 , pp. 323-327
    • Saeednia, S.1
  • 33
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer-Verlag
    • A. Shamir. Identity-based cryptosystems and signature schemes. In Proceedings of Crypto 84, pages 47-53. Springer-Verlag, 1985.
    • (1985) Proceedings of Crypto 84 , pp. 47-53
    • Shamir, A.1
  • 34
    • 84945129491 scopus 로고    scopus 로고
    • Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
    • B. Pfitzmann, editor. Springer-Verlag
    • E. R. Verheul. Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. In B. Pfitzmann, editor, Advances in Cryptology - Proceedings of EUROCRYPT'01, Lecture Notes in Computer Science 2045, pages 195-210. Springer-Verlag, 2001.
    • (2001) Advances in Cryptology - Proceedings of EUROCRYPT'01, Lecture Notes in Computer Science , vol.2045 , pp. 195-210
    • Verheul, E.R.1
  • 35
    • 0032669524 scopus 로고    scopus 로고
    • Fixing a security flaw in IKE protocols
    • 24th June
    • J. Zhou. Fixing a security flaw in IKE protocols. Electronics Letters, 35(13):1072-1073, 24th June 1999.
    • (1999) Electronics Letters , vol.35 , Issue.13 , pp. 1072-1073
    • Zhou, J.1
  • 36
    • 0034315483 scopus 로고    scopus 로고
    • Further analysis of the Internet key exchange protocol
    • J. Zhou. Further analysis of the Internet key exchange protocol. Computer Communications, 23:1606-1612, 2000.
    • (2000) Computer Communications , vol.23 , pp. 1606-1612
    • Zhou, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.