메뉴 건너뛰기




Volumn 1, Issue , 2005, Pages 388-391

An efficient ID-based deniable authentication protocol from pairings

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); DATA TRANSFER; SECURITY OF DATA;

EID: 33744464799     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2005.100     Document Type: Conference Paper
Times cited : (38)

References (14)
  • 3
    • 0037019232 scopus 로고    scopus 로고
    • Deniable authentication protocol based on Diffie-Hellman algorithm
    • L. Fan, C.X. Xu, J.H. Li, Deniable authentication protocol based on Diffie-Hellman algorithm, Electronics Letters 38(4) (2002) 705-706.
    • (2002) Electronics Letters , vol.38 , Issue.4 , pp. 705-706
    • Fan, L.1    Xu, C.X.2    Li, J.H.3
  • 4
    • 2342455866 scopus 로고    scopus 로고
    • Efficient deniable authentication protocol based on generalized ElGamal signature scheme
    • Z. Shao, Efficient deniable authentication protocol based on generalized ElGamal signature scheme, Computer Standards & Interfaces, 26, 2004, pp.449-454.
    • (2004) Computer Standards & Interfaces , vol.26 , pp. 449-454
    • Shao, Z.1
  • 5
    • 0345058957 scopus 로고    scopus 로고
    • Universal designated-verifier signatures
    • Advances in Cryptology-Asiacrypt'2003, Springer-Verlag
    • R. Steinfeld, L. Bull, H. Wang, J. Pieprzyk, Universal Designated-Verifier Signatures, Advances in Cryptology-Asiacrypt'2003, Lecture Notes on Computer Science 2894, Springer-Verlag, 2004, pp 523-542.
    • (2004) Lecture Notes on Computer Science , vol.2894 , pp. 523-542
    • Steinfeld, R.1    Bull, L.2    Wang, H.3    Pieprzyk, J.4
  • 6
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology-Crypto 84, Springer-Verlag
    • A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology-Crypto 84, LNCS 196, Springer-Verlag, 1984, pp.47-53.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Advances in Cryptology-Crypto 2001, Springer-Verlag
    • D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto 2001, LNCS 2139, Springer-Verlag, 2001, pp.213-229.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, SIAM Journal on Computing, 32(3), 2003, pp.586-615.
    • (2003) SIAM Journal on Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 9
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity based encryption without random oracles
    • Advances in Cryptology - Eurocrypt'2004, Springer-Verlag
    • D. Boneh, X. Boyen, Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles, Advances in Cryptology - Eurocrypt'2004, Lecture Notes on Computer Science 3027, Springer-Verlag, 2004, pp. 223-238.
    • (2004) Lecture Notes on Computer Science , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 10
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • Practice and Theory in Public Key Cryptography - PKC'2003, Springer-Verlag
    • JC Cha, JH Cheon, An Identity-Based Signature from Gap Diffie-Hellman Groups, Practice and Theory in Public Key Cryptography - PKC'2003, LNCS 2567, Springer-Verlag 2003, pp. 18-30.
    • (2003) LNCS , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 11
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Proceedings of 9th workshop on selected areas in cryptography -SAC 2002. K. Nyberg and H. Heys (Eds.). Springer-Verlag
    • F.Hess. Efficient identity based signature schemes based on pairings. Proceedings of 9th workshop on selected areas in cryptography -SAC 2002. K. Nyberg and H. Heys (Eds.): Lecture Notes in Computer Science 2595. Springer-Verlag, 2003, pp. 310-324.
    • (2003) Lecture Notes in Computer Science , vol.2595 , pp. 310-324
    • Hess, F.1
  • 14
    • 35048899816 scopus 로고    scopus 로고
    • Key agreement using statically keyed authenticators
    • 2004 Applied Cryptography and Network Security (ACNS'04), Springer-Verlag
    • C. Boyd, W. Mao, K. Paterson. Key agreement using statically keyed authenticators, 2004 Applied Cryptography and Network Security (ACNS'04), Lecture Notes in Computer Science 3089, Springer-Verlag, 2004, pp. 248-262.
    • (2004) Lecture Notes in Computer Science , vol.3089 , pp. 248-262
    • Boyd, C.1    Mao, W.2    Paterson, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.