메뉴 건너뛰기




Volumn 2, Issue 3-4, 2007, Pages 251-259

On security proof of McCullagh-Barreto’s key agreement protocol and its variants

Author keywords

identity based key agreement; pairings; security proof

Indexed keywords


EID: 38049042723     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2007.013178     Document Type: Article
Times cited : (27)

References (33)
  • 5
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity based encryption without random oracles
    • LNCS 3027
    • Boneh, D. and Boyen, X. (2004a) ‘Efficient selective-ID secure identity based encryption without random oracles’, Proceedings of Advances in Cryptology – Eurocrypt’2004, LNCS 3027, pp.223–238.
    • (2004) Proceedings of Advances in Cryptology – Eurocrypt’2004 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 8
    • 33645751214 scopus 로고    scopus 로고
    • Security proof of the Sakai-Kasahara’s identity-based encryption scheme
    • LNCS 3706
    • Chen, L. and Cheng, Z. (2005) ‘Security proof of the Sakai-Kasahara’s identity-based encryption scheme’, Proceedings of Cryptography and Coding 2005, LNCS 3706, pp.442–459.
    • (2005) Proceedings of Cryptography and Coding 2005 , pp. 442-459
    • Chen, L.1    Cheng, Z.2
  • 11
    • 38149061118 scopus 로고    scopus 로고
    • On the indistinguishability-based security model of key agreement protocols-simple cases
    • The full paper available on Cryptology ePrint Archive, Report 2005/129
    • Cheng, Z., Nistazakis, M., Comley, R. and Vasiu, L. (2004) ‘On the indistinguishability-based security model of key agreement protocols-simple cases’, Proceedings of ACNS 2004 (technical track), The full paper available on Cryptology ePrint Archive, Report 2005/129.
    • (2004) Proceedings of ACNS 2004 (technical track)
    • Cheng, Z.1    Nistazakis, M.2    Comley, R.3    Vasiu, L.4
  • 15
    • 33646180371 scopus 로고    scopus 로고
    • On session key construction in provably-secure key establishment protocols: revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-based protocols
    • LNCS 3715
    • Choo, K-K.R., Boyd, C. and Hitchcock, Y. (2005) ‘On session key construction in provably-secure key establishment protocols: revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-based protocols’, Proceedings of Mycrypt 2005, LNCS 3715, pp.116–131.
    • (2005) Proceedings of Mycrypt 2005 , pp. 116-131
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 19
    • 24144458508 scopus 로고    scopus 로고
    • A new two-party identity-based authenticated key agreement
    • LNCS 3376
    • McCullagh, N. and Barreto, P.S.L.M. (2005) ‘A new two-party identity-based authenticated key agreement’, Proceedings of CT-RSA 2005, LNCS 3376, pp.262–274.
    • (2005) Proceedings of CT-RSA 2005 , pp. 262-274
    • McCullagh, N.1    Barreto, P.S.L.M.2
  • 22
    • 0022811943 scopus 로고
    • Proposal for identity-based key distribution system
    • Okamoto, E. (1986) ‘Proposal for identity-based key distribution system’, Electronics Letters, Vol. 22, pp.1283–1284.
    • (1986) Electronics Letters , vol.22 , pp. 1283-1284
    • Okamoto, E.1
  • 27
    • 0037142442 scopus 로고    scopus 로고
    • An identity based authenticated key agreement protocol based on the weil pairing
    • Smart, N. P. (2002) ‘An identity based authenticated key agreement protocol based on the weil pairing’, Electronics Letters, Vol. 38, pp.630–632.
    • (2002) Electronics Letters , vol.38 , pp. 630-632
    • Smart, N.P.1
  • 29
    • 34347390578 scopus 로고
    • Key distribution system for mail systems using ID-related information directory
    • Tanaka, K. and Okamoto, E. (1991) ‘Key distribution system for mail systems using ID-related information directory’, Computers and Security, Vol. 10, pp.25–33.
    • (1991) Computers and Security , vol.10 , pp. 25-33
    • Tanaka, K.1    Okamoto, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.