메뉴 건너뛰기




Volumn 3348, Issue , 2004, Pages 17-32

Tripartite key exchange in the canetti-krawczyk proof model

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION MECHANISMS; KEY AGREEMENT PROTOCOL; KEY-EXCHANGE; PROPERTY; PROTOCOL CANS; PROVABLY SECURE; SECURE PROTOCOLS; KEY EXCHANGE;

EID: 34548783058     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30556-9_3     Document Type: Article
Times cited : (12)

References (20)
  • 1
    • 35048823512 scopus 로고    scopus 로고
    • Tripartite authenticated key agreement protocols from pairings
    • Cryptography and Coding, Springer-Verlag
    • Sattam S. Al-Riyami and Kenneth G. Paterson. Tripartite authenticated key agreement protocols from pairings. In Cryptography and Coding, volume 2898 of Lecture Notes in Computer Science, pages 332-359. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2898 , pp. 332-359
    • Sattam, S.1    Al-Riyami2    Paterson, K.G.3
  • 2
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Advances in CryptologyCRYPTO 2002, Springer-Verlag
    • Paulo S. L. M. Barreto, Hae Y. Kirn, Ben Lynn, and Michael Scott. Efficient algorithms for pairing-based cryptosystems. In Advances in CryptologyCRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 354-368. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 354-368
    • Barreto, P.S.L.M.1    Kirn, H.Y.2    Lynn, B.3    Scott, M.4
  • 3
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract)
    • New York, May ACM Press. [Pull paper online]
    • Mihir Bellare, Ran Canetti, and Hugo Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract). In Proceedings of the 30th Annual ACM Symposium on Theory of Computing (STOC '98), pages 419-428, New York, May 1998. ACM Press. [Pull paper online] http://www-cse.ucsd. edu/users/mihir/papers/nodular.ps.gz.
    • (1998) Proceedings of the 30th Annual ACM Symposium on Theory of Computing (STOC '98) , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 4
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes (extended abstract)
    • Advances in Cryptology-CRYPTO '98, Springer-Verlag, [Pull paper online]
    • Mihir Bellare, Anand Desai, David Pointcheval, and Phil Rogaway. Relations among notions of security for public-key encryption schemes (extended abstract). In Advances in Cryptology-CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pages 26-45. Springer-Verlag, 1998. [Pull paper online] http://www-cse.ucsd.edu/users/mihir/papers/relations.pdf.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Advances in Cryptology-CRYPTO 2001, Springer-Verlag, [Full paper online]
    • Dan Boneh and Matthew Franklin. Identity-based encryption from the Weil pairing. In Advances in Cryptology-CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 213-229. Springer-Verlag, 2001. [Full paper online] http://crypto.Stanford.edu/"dabo/abstracts/ibe.html.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Advances in Cryptology-ASIACRYPT 2001, Springer-Verlag, [Full paper online]
    • Dan Boneh, Ben Lynn, and Hovav Shacham. Short signatures from the Weil pairing. In Advances in Cryptology-ASIACRYPT 2001, volume 2139 of Lecture Notes in Computer Science, pages 514-532. Springer-Verlag, 2001. [Full paper online] http://crypto.stanford.edu/~dabo/abstracts/weilsigs.html.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 8
    • 0035751060 scopus 로고    scopus 로고
    • Provably authenticated group Diffie-Hellman key exchange
    • P. Samarati, editor, Philadelphia, Pennsylvania, USA, November ACM, ACM Press
    • E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater. Provably authenticated group Diffie-Hellman key exchange. In P. Samarati, editor, Proc. of ACM-CCS 01, pages 255-264, Philadelphia, Pennsylvania, USA, November 2001. ACM, ACM Press.
    • (2001) Proc. of ACM-CCS 01 , pp. 255-264
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3    Quisquater, J.-J.4
  • 9
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Advances in Cryptology-EUROCRYPT 2001, Springer-Verlag, [Full paper online]
    • Ran Canetti and Hugo Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Advances in Cryptology-EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 451-472. Springer-Verlag, 2001. [Full paper online] http://eprint.iacr.org/2001/040.ps. gz.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 451-472
    • Canetti, R.1    Krawczyk, H.2
  • 10
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap DiffieHellman groups
    • Practice and Theory in Public Key Cryptography-PKC 2003, Springer-Verlag
    • Jae Choon Cha and Jung Hee Cheon. An identity-based signature from gap DiffieHellman groups. In Practice and Theory in Public Key Cryptography-PKC 2003, volume 2567 of Lecture Notes in Computer Science, pages 18-30. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 11
    • 35048821649 scopus 로고    scopus 로고
    • Diffie-Hellman problems and bilinear maps
    • [Online] [accessed 11/07/2003]
    • Jung Hee Cheon and Dong Hoon Lee. Diffie-Hellman problems and bilinear maps. Cryptology ePrint Archive, Report 2002/117, 2002. [Online] http://eprint.iacr.org/ [accessed 11/07/2003].
    • (2002) Cryptology EPrint Archive, Report 2002/117
    • Cheon, J.H.1    Lee, D.H.2
  • 12
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Selected Areas in Cryptography-SAC 2002, Springer-Verlag
    • Florian Hess. Efficient identity based signature schemes based on pairings. In Selected Areas in Cryptography-SAC 2002, volume 2595 of Lecture Notes in Computer Science, pages 310-324. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2595 , pp. 310-324
    • Hess, F.1
  • 13
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • Algorithmic Number Theory: Fourth International Symposium-ANTS-IV 2000, Proceedings, SpringerVerlag
    • Antoine Joux. A one round protocol for tripartite Diffie-Hellman. In Algorithmic Number Theory: Fourth International Symposium-ANTS-IV 2000, Proceedings, volume 1838 of Lecture Notes in Computer Science, pages 385-393. SpringerVerlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1838 , pp. 385-393
    • Joux, A.1
  • 14
    • 35048893509 scopus 로고    scopus 로고
    • New identity based signcryption schemes from pairings
    • [Online] [accessed 11/07/2003]
    • Benoit Libert and Jean-Jacques Quisquater. New identity based signcryption schemes from pairings. Cryptology ePrint Archive, Report 2003/023, 2003. [Online] http://eprint.iacr.org/ [accessed 11/07/2003].
    • (2003) Cryptology EPrint Archive, Report 2003/023
    • Libert, B.1    Quisquater, J.-J.2
  • 15
    • 1142282396 scopus 로고    scopus 로고
    • Authenticated identity-based encryption
    • [Online] [accessed 11/07/2003]
    • Ben Lynn. Authenticated identity-based encryption. Cryptology ePrint Archive, Report 2002/072, 2002. [Online] http://eprint.iacr.org/ [accessed 11/07/2003].
    • (2002) Cryptology EPrint Archive, Report 2002/072
    • Lynn, B.1
  • 16
    • 0242445175 scopus 로고    scopus 로고
    • Identity-based signcryption
    • [Online] [accessed 11/07/2003]
    • John Malone-Lee. Identity-based signcryption. Cryptology ePrint Archive, Report 2002/098, 2002. [Online] http://eprint.iacr.org/ [accessed 11/07/2003].
    • (2002) Cryptology EPrint Archive, Report 2002/098
    • Malone-Lee, J.1
  • 18
    • 33645596850 scopus 로고    scopus 로고
    • Signcryption scheme for identity-based cryptosystems
    • [Online] [accessed 11/07/2003]
    • Divya Nalla and K.C. Reddy. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report 2003/066, 2003. [Online] http://eprint.iacr.org/ [accessed 11/07/2003].
    • (2003) Cryptology EPrint Archive, Report 2003/066
    • Nalla, D.1    Reddy, K.C.2
  • 19
    • 1642414982 scopus 로고    scopus 로고
    • Cryptography from pairings: A snapshot of current research
    • K.G. Paterson. Cryptography from pairings: a snapshot of current research. Information Security Technical Report, 7(3):41-54, 2002.
    • (2002) Information Security Technical Report , vol.7 , Issue.3 , pp. 41-54
    • Paterson, K.G.1
  • 20
    • 63449093784 scopus 로고    scopus 로고
    • Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach
    • Information Security and Privacy-ACISP 2003, Springer-Verlag
    • Yiu Shing Terry Tin, Colin Boyd, and Juan Manuel Gonzalez Nieto. Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach. In Information Security and Privacy-ACISP 2003, volume 2727 of Lecture Notes in Computer Science, pages 166-179. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2727 , pp. 166-179
    • Tin, Y.S.T.1    Boyd, C.2    Nieto, J.M.G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.