-
2
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Berlin: Springer-Verlag
-
SHAMIR A. Identity-based cryptosystems and signature schemes[A]. Advances in Cryptology-Crypto'84[C]. Berlin: Springer-Verlag, 1984. 47-53.
-
(1984)
Advances in Cryptology-Crypto'84
, pp. 47-53
-
-
Shamir, A.1
-
3
-
-
0022811943
-
Proposal for identity-based key distribution system
-
OKAMOTO E. Proposal for identity-based key distribution system[J]. Electron Letters, 1986, 22: 1283-1284.
-
(1986)
Electron Letters
, vol.22
, pp. 1283-1284
-
-
Okamoto, E.1
-
4
-
-
34347390578
-
Key distribution system for mail systems using ID-related information directory
-
TANAKA K, OKAMOTO E. Key distribution system for mail systems using ID-related information directory[J]. Computer Security, 1991, 10: 5-33.
-
(1991)
Computer Security
, vol.10
, pp. 5-33
-
-
Tanaka, K.1
Okamoto, E.2
-
5
-
-
84874324906
-
Identity based encryption from the Weil pairing
-
Berlin: Springer-Verlag
-
BONEH D, FRANKLIN M. Identity based encryption from the Weil pairing[A]. Advances in Cryptology-Crypto 2001[C]. Berlin: Springer-Verlag, 2001. 213-229.
-
(2001)
Advances in Cryptology-Crypto 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
0037142442
-
An identity based authenticated key agreement rotocol based on the Weil pairing
-
SMART N P. An identity based authenticated key agreement rotocol based on the Weil pairing[J]. Electro Letters, 2002, 38: 30-632.
-
(2002)
Electro Letters
, vol.38
, pp. 30-632
-
-
Smart, N.P.1
-
7
-
-
0037461946
-
Efficient ID-based key agreement from the Weil pairing
-
XUN Y. Efficient ID-based key agreement from the Weil pairing[J]. IEE Electronics Letters, 2003, 39(2): 206-208.
-
(2003)
IEE Electronics Letters
, vol.39
, Issue.2
, pp. 206-208
-
-
Xun, Y.1
-
8
-
-
0038680685
-
Efficient ID-based authenticated key agreement protocol based on the Weil pairing
-
SHIM K. Efficient ID-based authenticated key agreement protocol based on the Weil pairing[J]. IEE Electronics Letters, 2003, 39(8): 653-654.
-
(2003)
IEE Electronics Letters
, vol.39
, Issue.8
, pp. 653-654
-
-
Shim, K.1
-
9
-
-
33645606306
-
Security analysis of Shim's authenticated key agreement protocols from pairings
-
SUN H, HSIEH B. Security analysis of Shim's authenticated key agreement protocols from pairings[EB/OL]. http://eprint.iacr.org/2003/113.
-
-
-
Sun, H.1
Hsieh, B.2
-
10
-
-
24144458508
-
A new two party identity-based authenticated key agreement
-
Berlin: Springer-Verlag
-
MCCULLAGH N, BARRETO P. A new two party identity-based authenticated key agreement[A]. Proceedings of the RSA Conference 2005[C]. Berlin: Springer-Verlag, 2005. 262-274.
-
(2005)
Proceedings of the RSA Conference 2005
, pp. 262-274
-
-
Mccullagh, N.1
Barreto, P.2
-
11
-
-
58249136926
-
Cryptanalysis of the Noel McCullagh and Paulo S L M Barreto's two party identity-based key agreement
-
XIE G. Cryptanalysis of the Noel McCullagh and Paulo S L M Barreto's two party identity-based key agreement[EB/OL]. http://eprint.iacr.org/2004/343.
-
-
-
Xie, G.1
-
14
-
-
4243180376
-
The random oracle methodology, revisited
-
CANETTI R, GOLDREICH O, HALEVI S. The random oracle methodology, revisited[J]. Journal of the ACM, 2004, 51(4): 557-594.
-
(2004)
Journal of the ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
16
-
-
36248939192
-
Provably secure identity-based authenticated key agreement protocols in the standard model
-
WANG S B, CAO Z F, DONG X L. Provably secure identity-based authenticated key agreement protocols in the standard model[J]. Chinese Journal of Computers, 2007, 30(10): 1842-1854.
-
(2007)
Chinese Journal of Computers
, vol.30
, Issue.10
, pp. 1842-1854
-
-
Wang, S.B.1
Cao, Z.F.2
Dong, X.L.3
|