메뉴 건너뛰기




Volumn 3, Issue 7, 2006, Pages 1407-1410

Weakness of Shim's new ID-based tripartite multiple-key agreement protocol

Author keywords

ID based; Impersonation attack; Tripartite authenticated key agreement; Weil paring

Indexed keywords

DATA PRIVACY; NETWORK PROTOCOLS; SECURITY OF DATA; USER INTERFACES;

EID: 33744548326     PISSN: 17900832     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (6)

References (14)
  • 2
    • 0141939020 scopus 로고    scopus 로고
    • ID-based tripartite key agreement protocol with pairing
    • or available at Cryptology ePrint Archive, Report 2002/122
    • S. Liu, F. Zhang, K. Chen, ID-based tripartite key agreement protocol with pairing, IEEE International Symposium on Information Theory, 2003, pp. 136-143, or available at Cryptology ePrint Archive, Report 2002/122.
    • (2003) IEEE International Symposium on Information Theory , pp. 136-143
    • Liu, S.1    Zhang, F.2    Chen, K.3
  • 3
    • 20444468070 scopus 로고    scopus 로고
    • Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings
    • July 26
    • Kyungah Shim and Sungsik Woo, Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings, Applied Mathematics and Computation, Vol.166, Issue: 3, July 26, 2005, pp. 523-530.
    • (2005) Applied Mathematics and Computation , vol.166 , Issue.3 , pp. 523-530
    • Shim, K.1    Woo, S.2
  • 4
    • 33744508777 scopus 로고    scopus 로고
    • Extending Joux Protocol to Multi Party Key Agreemen"
    • Also available at
    • R. Barua, R.Dutta, P. Sarkar, Extending Joux Protocol to Multi Party Key Agreemen", Indocrypt 2003, Also available at http://eprint.iacr.org/ 2003/062.
    • Indocrypt 2003
    • Barua, R.1    Dutta, R.2    Sarkar, P.3
  • 5
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • LNCS 2442, Springer-Verlag
    • P. S. L. M. Berreto, H. Y. Kim and M.Scott, Efficient algorithms for pairing-based cryptosystems, Advances in Cryptology - Crypto '2002, LNCS 2442, Springer-Verlag (2002), pp. 354-368.
    • (2002) Advances in Cryptology - Crypto '2002 , pp. 354-368
    • Berreto, P.S.L.M.1    Kim, H.Y.2    Scott, M.3
  • 6
    • 35248880074 scopus 로고    scopus 로고
    • Efficient Threshold Signature, Multisignature and Blind Signature Schemes Based on the Gap-Diffie-Hell,am-Group Signature Scheme
    • LNCS 2139, Springer-Verlag
    • A. Boldyreva, Efficient Threshold Signature, Multisignature and Blind Signature Schemes Based on the Gap-Diffie-Hell,am-Group Signature Scheme, PKC2003, LNCS 2139, Springer-Verlag, 2003, pp. 31-46.
    • (2003) PKC2003 , pp. 31-46
    • Boldyreva, A.1
  • 7
    • 14844315859 scopus 로고    scopus 로고
    • Short Signature without Random Oracles
    • Christian Cachin and Jan Camenisch, editors. LNCS, Springer-Verlag
    • D. Boneh, X.Boyen, Short Signature without Random Oracles, In Christian Cachin and Jan Camenisch, editors. Proceedings of Eurocrypt 2004, LNCS, Springer-Verlag, 2004.
    • (2004) Proceedings of Eurocrypt 2004
    • Boneh, D.1    Boyen, X.2
  • 8
    • 0037623983 scopus 로고    scopus 로고
    • Identity Based Encryption from the Weil Pairing
    • Extended Abstract in Crypto 2001
    • D. Boneh, M. Franklin, Identity Based Encryption from the Weil Pairing, SIAM J. of Computing, Vol.32, No. 3, pp. 586-615, 2003, Extended Abstract in Crypto 2001.
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 10
    • 35248901398 scopus 로고    scopus 로고
    • A secure Signature Scheme from Bilinear Maps
    • D. Boneh, I. Mironov, V. Shoup, A secure Signature Scheme from Bilinear Maps, CT-RSA-2003, pp. 98-110.
    • CT-RSA-2003 , pp. 98-110
    • Boneh, D.1    Mironov, I.2    Shoup, V.3
  • 11
    • 18844407247 scopus 로고    scopus 로고
    • Applications of Multilinear forms Cryptography
    • Report 2002/080
    • D. Boneh, A. Silverberg, Applications of Multilinear forms Cryptography, Report 2002/080, http://eprint.iacr.org, 2002.
    • (2002)
    • Boneh, D.1    Silverberg, A.2
  • 12
    • 84955339164 scopus 로고    scopus 로고
    • Secure Integration of Asymmetric and Symmetric Encryption Schemes
    • LNCS 1666, Springer-Verlag
    • E. Fujisaki, T. Okamoto, Secure Integration of Asymmetric and Symmetric Encryption Schemes, in Advances in Cryptology - Crypto'99, LNCS 1666, Springer-Verlag, 1999.
    • (1999) Advances in Cryptology - Crypto'99
    • Fujisaki, E.1    Okamoto, T.2
  • 14
    • 33744523283 scopus 로고    scopus 로고
    • Improving Shim's tripartite authenticated key agreement protocol based on Weil pairing
    • Taipei, Taiwan, June 10-11
    • Chu-Hsing Lin, K. J. Huang and H. H. Lin, Improving Shim's tripartite authenticated key agreement protocol based on Weil pairing, Proceedings of 14th Information Security Conference, Taipei, Taiwan, June 10-11, 2004, pp. 250-255.
    • (2004) Proceedings of 14th Information Security Conference , pp. 250-255
    • Lin, C.-H.1    Huang, K.J.2    Lin, H.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.