메뉴 건너뛰기




Volumn 31, Issue 6, 2009, Pages 1056-1060

Two improved two-party identity-based authenticated key agreement protocols

Author keywords

Authentication; Identity based; Key agreement; Security

Indexed keywords

AUTHENTICATED KEY AGREEMENT PROTOCOLS; IDENTITY INFORMATION; IDENTITY-BASED; KEY AGREEMENT; KEY-COMPROMISE IMPERSONATION; SECURITY; SECURITY PROPERTIES;

EID: 68849109202     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2008.09.024     Document Type: Article
Times cited : (19)

References (19)
  • 1
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • 13th Annual International Cryptology Conference - CRYPTO '93, Springer, USA
    • Bellare M., and Rogaway P. Entity authentication and key distribution. 13th Annual International Cryptology Conference - CRYPTO '93. Lecture Notes in Computer Science vol. 773 (1994), Springer, USA 232-249
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 2
    • 85013976350 scopus 로고
    • On the risk of opening distributed keys
    • 14th Annual International Cryptology Conference - CRYPTO '94, Springer, USA
    • Burmester M.V.D. On the risk of opening distributed keys. 14th Annual International Cryptology Conference - CRYPTO '94. Lecture Notes in Computer Science vol. 839 (1994), Springer, USA 308-317
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 308-317
    • Burmester, M.V.D.1
  • 3
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis (extended abstract)
    • 6th IMA International Conference on Cryptography and Coding, Springer, USA
    • Blake-Wilson S., Johnson D., and Menezes A. Key agreement protocols and their security analysis (extended abstract). 6th IMA International Conference on Cryptography and Coding. Lecture Notes In Computer Science vol. 1355 (1997), Springer, USA 30-45
    • (1997) Lecture Notes In Computer Science , vol.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 5
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature protocol based on discrete logarithms
    • Elgamal T. A public key cryptosystem and a signature protocol based on discrete logarithms. IEEE Transactions on Information Theory 31 (1985) 469-472
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 6
    • 84969368443 scopus 로고
    • An identity-based key-exchange protocol
    • An Identity-Based Key-Exchange Protocol, Springer, USA
    • Günther C.G. An identity-based key-exchange protocol. An Identity-Based Key-Exchange Protocol. Lecture Notes in Computer Science vol. 434 (1990), Springer, USA 29.s-37.s
    • (1990) Lecture Notes in Computer Science , vol.434
    • Günther, C.G.1
  • 10
    • 84964242030 scopus 로고
    • Key distribution-systems based on identification information
    • Theory and Applications of Cryptographic Techniques on Advances in Cryptology, Springer, USA
    • Okamoto E. Key distribution-systems based on identification information. Theory and Applications of Cryptographic Techniques on Advances in Cryptology. Lecture Notes In Computer Science vol. 293 (1988), Springer, USA 194-202
    • (1988) Lecture Notes In Computer Science , vol.293 , pp. 194-202
    • Okamoto, E.1
  • 11
    • 0024665726 scopus 로고
    • Key distribution system based on identification information
    • Okamoto E., and Tanaka K. Key distribution system based on identification information. Journal on Selected Areas in Communications 7 4 (1989) 481-485
    • (1989) Journal on Selected Areas in Communications , vol.7 , Issue.4 , pp. 481-485
    • Okamoto, E.1    Tanaka, K.2
  • 12
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • 16th Annual International Cryptology Conference - CRYPTO '96, Springer, USA
    • Pointcheval D., and Stern J. Security proofs for signature schemes. 16th Annual International Cryptology Conference - CRYPTO '96. Lecture Notes in Computer Science vol. 1070 (1996), Springer, USA 387-398
    • (1996) Lecture Notes in Computer Science , vol.1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 13
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • Rivest R.L., Shamir A., and Adleman L. Method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (1978) 120-126
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 14
    • 0034249013 scopus 로고    scopus 로고
    • Improvement of Günther's identity-based key exchange protocol
    • Saeednia S. Improvement of Günther's identity-based key exchange protocol. Electronics Letters 36 18 (2000) 1535-1536
    • (2000) Electronics Letters , vol.36 , Issue.18 , pp. 1535-1536
    • Saeednia, S.1
  • 15
    • 84947923408 scopus 로고    scopus 로고
    • A new identity-based key exchange protocol minimizing computation and communication
    • First International Workshop on Information Security, Springer, USA
    • Saeednia S., and Safavi-Naini R. A new identity-based key exchange protocol minimizing computation and communication. First International Workshop on Information Security. Lecture Notes In Computer Science vol. 1396 (1998), Springer, USA 328-334
    • (1998) Lecture Notes In Computer Science , vol.1396 , pp. 328-334
    • Saeednia, S.1    Safavi-Naini, R.2
  • 16
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • 9th Annual International Cryptology Conference - CRYPTO '89, Springer, USA
    • Schnorr C.P. Efficient identification and signatures for smart cards. 9th Annual International Cryptology Conference - CRYPTO '89. Lecture Notes in Computer Science vol. 435 (1989), Springer, USA 235-251
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 235-251
    • Schnorr, C.P.1
  • 18
    • 33947405259 scopus 로고    scopus 로고
    • An efficient two-party identity-based key exchange protocol
    • Tseng Y.M. An efficient two-party identity-based key exchange protocol. Informatica 18 1 (2007) 125-136
    • (2007) Informatica , vol.18 , Issue.1 , pp. 125-136
    • Tseng, Y.M.1
  • 19
    • 33947430192 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an identity-based key exchange protocol
    • Tseng Y.M., Jan J.K., and Wang C.H. Cryptanalysis and improvement of an identity-based key exchange protocol. Journal of Computers 14 3 (2002) 17-22
    • (2002) Journal of Computers , vol.14 , Issue.3 , pp. 17-22
    • Tseng, Y.M.1    Jan, J.K.2    Wang, C.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.