메뉴 건너뛰기




Volumn 30, Issue 10, 2007, Pages 1842-1852

Provably secure identity-based authenticated key agreement protocols in the standard model

Author keywords

Authenticated key agreement; Bilinear pairings; Identity based cryptography; Standard model

Indexed keywords

AUTHENTICATION; COMMUNICATION; CRYPTOGRAPHY; NETWORK PROTOCOLS;

EID: 36248939192     PISSN: 02544164     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (42)

References (25)
  • 1
    • 84949221411 scopus 로고    scopus 로고
    • Authenticated Diffie-Hellman key agreement protocols
    • Lecture Notes in Computer Science 1556. Berlin: Springer-Verlag
    • Blake-Wilson S, Menezes A. Authenticated Diffie-Hellman key agreement protocols//Proceedings of the SAC'98, Lecture Notes in Computer Science 1556. Berlin: Springer-Verlag, 1999: 339-361
    • (1999) Proceedings of the SAC'98 , pp. 339-361
    • Blake-Wilson, S.1    Menezes, A.2
  • 3
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Lecture Notes in Computer Science 196. Berlin: Springer-Verlag
    • Shamir A. Identity-based cryptosystems and signature schemes//Proceedings of the CRYPTO'84, Lecture Notes in Computer Science 196. Berlin: Springer-Verlag, 1984: 47-53
    • (1984) Proceedings of the CRYPTO'84 , pp. 47-53
    • Shamir, A.1
  • 4
    • 24144458508 scopus 로고    scopus 로고
    • A new two-party identity-based authenticated key agreement
    • Lecture Notes in Computer Science 3376. Berlin: Springer-Verlag
    • McCullagh N, Barreto P S L M. A new two-party identity-based authenticated key agreement//Proceedings of the CT-RSA'05, Lecture Notes in Computer Science 3376. Berlin: Springer-Verlag, 2005: 262-274
    • (2005) Proceedings of the CT-RSA'05 , pp. 262-274
    • McCullagh, N.1    Barreto, P.S.L.M.2
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag
    • Boneh D, Franklin M. Identity-based encryption from the Weil pairing//Proceedings of the CRYPTO'01, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001: 213-229
    • (2001) Proceedings of the CRYPTO'01 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 84874800178 scopus 로고
    • A public key cryptosystem and signature scheme based on discrete logarithms
    • El Gamal T. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Transaction on Information Theory, 1985, 31(4): 469-472
    • (1985) IEEE Transaction on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • El Gamal, T.1
  • 7
    • 0037142442 scopus 로고    scopus 로고
    • An ID-based authenticated key agreement protocol based on the Weil pairing
    • Smart N. An ID-based authenticated key agreement protocol based on the Weil pairing. Electronic Letters, 2002, 38(13): 630-632
    • (2002) Electronic Letters , vol.38 , Issue.13 , pp. 630-632
    • Smart, N.1
  • 8
    • 0038680685 scopus 로고    scopus 로고
    • Efficient ID-based authenticated key agreement protocol based on Weil pairing
    • Shim K. Efficient ID-based authenticated key agreement protocol based on Weil pairing. Electronic Letters, 2003, 39(8): 653-654
    • (2003) Electronic Letters , vol.39 , Issue.8 , pp. 653-654
    • Shim, K.1
  • 10
    • 33645590972 scopus 로고    scopus 로고
    • An efficient ID-based authenticated key agreement protocol from pairings
    • Lecture Notes in Computer Science 3042. Berlin: Springer-Verlag
    • Ryu E K, Yoon E J, Yoo K Y. An efficient ID-based authenticated key agreement protocol from pairings//Proceedings of the NETWORKING'04, Lecture Notes in Computer Science 3042. Berlin: Springer-Verlag, 2004: 1458-1463
    • (2004) Proceedings of the NETWORKING'04 , pp. 1458-1463
    • Ryu, E.K.1    Yoon, E.J.2    Yoo, K.Y.3
  • 11
    • 35048899816 scopus 로고    scopus 로고
    • Key agreement using statically keyed authenticators
    • Lecture Notes in Computer Science 3089. Berlin: Springer-Verlag
    • Boyd C, Mao W, Paterson K. Key agreement using statically keyed authenticators//Proceedings of ACNS'04, Lecture Notes in Computer Science 3089. Berlin: Springer-Verlag, 2004: 248-262
    • (2004) Proceedings of ACNS'04 , pp. 248-262
    • Boyd, C.1    Mao, W.2    Paterson, K.3
  • 12
    • 10444220191 scopus 로고    scopus 로고
    • Efficient identity-based authenticated key agreement protocol from pairings
    • Choie Y J, Jeong E, Lee E. Efficient identity-based authenticated key agreement protocol from pairings. Journal of Applied Mathematics and Computation, 2005, 162(1): 179-188
    • (2005) Journal of Applied Mathematics and Computation , vol.162 , Issue.1 , pp. 179-188
    • Choie, Y.J.1    Jeong, E.2    Lee, E.3
  • 13
    • 33645734037 scopus 로고    scopus 로고
    • An ID-based key agreement scheme from pairing
    • Cryptology ePrint Archive, Report 2005/093
    • Xie G. An ID-based key agreement scheme from pairing. Cryptology ePrint Archive, Report 2005/093, 2005
    • (2005)
    • Xie, G.1
  • 14
    • 36248932062 scopus 로고    scopus 로고
    • Identity-based key agreement protocols from pairings
    • Cryptology ePrint Archive, Report 2006/199
    • Chen L, Cheng Z, Smart N P. Identity-based key agreement protocols from pairings. Cryptology ePrint Archive, Report 2006/199, 2006
    • (2006)
    • Chen, L.1    Cheng, Z.2    Smart, N.P.3
  • 15
    • 33646184315 scopus 로고    scopus 로고
    • Efficient identity-based and authenticated key agreement protocol
    • Cryptology ePrint Archive, Report 2005/108
    • Wang Y. Efficient identity-based and authenticated key agreement protocol. Cryptology ePrint Archive, Report 2005/108, 2005
    • (2005)
    • Wang, Y.1
  • 17
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • Lecture Notes in Computer Science 4004. Berlin: Springer-Verlag
    • Gentry C. Practical identity-based encryption without random oracles//Proceedings of the EUROCRYPT'06, Lecture Notes in Computer Science 4004. Berlin: Springer-Verlag, 2006: 445-464
    • (2006) Proceedings of the EUROCRYPT'06 , pp. 445-464
    • Gentry, C.1
  • 18
    • 33750015293 scopus 로고    scopus 로고
    • About the Security of MTI/CO and MQV
    • Lecture Notes in Computer Science 4116. Berlin: Springer-Verlag
    • Kunz-Jacques S, Pointcheval D. About the Security of MTI/CO and MQV//Proceedings of the SCN'06, Lecture Notes in Computer Science 4116. Berlin: Springer-Verlag, 2006: 156-172
    • (2006) Proceedings of the SCN'06 , pp. 156-172
    • Kunz-Jacques, S.1    Pointcheval, D.2
  • 20
    • 36248981438 scopus 로고
    • Cryptographic method and apparatus for public key exchange with authentication
    • US Patent 4956863
    • Goss K C. Cryptographic method and apparatus for public key exchange with authentication. US Patent 4956863, September 1990
    • (1990)
    • Goss, K.C.1
  • 24
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Lecture Notes in Computer Science 773. Berlin: Springer-Verlag
    • Bellare M, Rogaway P. Entity authentication and key distribution//Proceedings of the CRYPTO'93, Lecture Notes in Computer Science 773. Berlin: Springer-Verlag, 1994: 110-125
    • (1994) Proceedings of the CRYPTO'93 , pp. 110-125
    • Bellare, M.1    Rogaway, P.2
  • 25
    • 33646180371 scopus 로고    scopus 로고
    • On session key construction in provably secure protocols
    • Lecture Notes in Computer Science 3715. Berlin: Springer-Verlag
    • Choo K-K R, Boyd C, Hitchcock Y. On session key construction in provably secure protocols//Proceedings of the MYCRYPT'05. Lecture Notes in Computer Science 3715. Berlin: Springer-Verlag, 2005: 116-131
    • (2005) Proceedings of the MYCRYPT'05 , pp. 116-131
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.