메뉴 건너뛰기




Volumn 180, Issue 6, 2010, Pages 1020-1030

Simulatable certificateless two-party authenticated key agreement protocol

Author keywords

Authenticated key agreement; Certificateless cryptography; Information security; Protocol design; Provable security

Indexed keywords

AUTHENTICATED KEY AGREEMENT; CERTIFICATELESS; CERTIFICATELESS CRYPTOGRAPHY; INFORMATION SECURITY; PROVABLE SECURITY;

EID: 73149101252     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2009.11.036     Document Type: Article
Times cited : (81)

References (30)
  • 1
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Proceedings of the ASIACRYPT 2003, Springer-Verlag
    • Al-Riyami S.S., and Paterson K.G. Certificateless public key cryptography. Proceedings of the ASIACRYPT 2003. LNCS vol. 2894 (2003), Springer-Verlag 452-473
    • (2003) LNCS , vol.2894 , pp. 452-473
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 2
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Proceedings of the CRYPTO 1993, Springer-Verlag
    • Bellare M., and Rogaway P. Entity authentication and key distribution. Proceedings of the CRYPTO 1993. LNCS vol. 773 (1994), Springer-Verlag 232-249
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • ACM
    • M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in: Proceedings of the ACM CCCS 1993, ACM, 1993, pp. 62-73.
    • (1993) Proceedings of the ACM CCCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Proceedings of the EUROCRYPT 2000, Springer-Verlag
    • Bellare M., Pointcheval D., and Rogaway P. Authenticated key exchange secure against dictionary attacks. Proceedings of the EUROCRYPT 2000. LNCS vol. 1807 (2000), Springer-Verlag 139-155
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 5
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis
    • Proceedings of the Crytography and Coding 1997, Springer-Verlag
    • Blake-Wilson S., Johason D., and Menezes A. Key agreement protocols and their security analysis. Proceedings of the Crytography and Coding 1997. LNCS vol. 1355 (1997), Springer-Verlag 30-45
    • (1997) LNCS , vol.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johason, D.2    Menezes, A.3
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Proceedings of the CRYPTO, Springer-Verlag
    • Boneh D., and Franklin F. Identity-based encryption from the Weil pairing. Proceedings of the CRYPTO. LNCS vol. 2139 (2001), Springer-Verlag 213-229
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, F.2
  • 7
    • 67849099096 scopus 로고    scopus 로고
    • Certificateless threshold ring signature
    • 10.1016/j.ins.2009.06.017
    • Chang S., Wong D.S., Mu Y., and Zhang Z. Certificateless threshold ring signature. Information Sciences (2009) 10.1016/j.ins.2009.06.017
    • (2009) Information Sciences
    • Chang, S.1    Wong, D.S.2    Mu, Y.3    Zhang, Z.4
  • 9
    • 10444246846 scopus 로고    scopus 로고
    • Identity based authenticated key agreement from pairings, Cryptology ePrint Archive
    • Report 2002/184
    • L. Chen, C. Kudla, Identity based authenticated key agreement from pairings, Cryptology ePrint Archive, Report 2002/184, 2002, .
    • (2002)
    • Chen, L.1    Kudla, C.2
  • 10
    • 38149061118 scopus 로고    scopus 로고
    • On the indistinguishability-based security model of key agreement protocols-simple cases, Cryptology ePrint Archive
    • Report 2005/129
    • Z. Cheng, M. Nistazakis, R. Comley, L. Vasiu, On the indistinguishability-based security model of key agreement protocols-simple cases, Cryptology ePrint Archive, Report 2005/129, .
    • Cheng, Z.1    Nistazakis, M.2    Comley, R.3    Vasiu, L.4
  • 12
    • 35748976265 scopus 로고    scopus 로고
    • Certificateless undeniable signature scheme
    • Duan S. Certificateless undeniable signature scheme. Information Sciences 178 3 (2008) 742-755
    • (2008) Information Sciences , vol.178 , Issue.3 , pp. 742-755
    • Duan, S.1
  • 13
    • 62849086420 scopus 로고    scopus 로고
    • Design of DL-based certificateless digital signatures
    • Harn L., Ren J., and Lin C. Design of DL-based certificateless digital signatures. Journal of Systems and Software 82 5 (2009) 789-793
    • (2009) Journal of Systems and Software , vol.82 , Issue.5 , pp. 789-793
    • Harn, L.1    Ren, J.2    Lin, C.3
  • 14
    • 38149080541 scopus 로고    scopus 로고
    • Certificateless signature revisited
    • Proceedings of the ACISP 2007, Springer-Verlag
    • Huang X., Mu Y., Susilo W., Wong D.S., and Wu W. Certificateless signature revisited. Proceedings of the ACISP 2007. LNCS vol. 4586 (2007), Springer-Verlag 308-322
    • (2007) LNCS , vol.4586 , pp. 308-322
    • Huang, X.1    Mu, Y.2    Susilo, W.3    Wong, D.S.4    Wu, W.5
  • 15
    • 33646756559 scopus 로고    scopus 로고
    • Modular security proofs for key agreement protocols
    • Proceedings of the ASIACRYPT 2005, Springer-Verlag
    • Kudla C., and Paterson K. Modular security proofs for key agreement protocols. Proceedings of the ASIACRYPT 2005. LNCS vol. 3788 (2005), Springer-Verlag 549-565
    • (2005) LNCS , vol.3788 , pp. 549-565
    • Kudla, C.1    Paterson, K.2
  • 16
    • 58349101975 scopus 로고    scopus 로고
    • An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography
    • IEEE
    • M. Luo, Y. Wen, H. Zhao, An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography, in: Proceedings of the IEEE ICYCS 2008, IEEE, 2008, pp. 1577-1582.
    • (2008) Proceedings of the IEEE ICYCS , pp. 1577-1582
    • Luo, M.1    Wen, Y.2    Zhao, H.3
  • 17
    • 49949116357 scopus 로고    scopus 로고
    • Certificateless authenticated two-party key agreement protocols
    • Proceedings of the ASIAN 2006, Springer-Verlag
    • Mandt T., and Tan C. Certificateless authenticated two-party key agreement protocols. Proceedings of the ASIAN 2006. LNCS vol. 4435 (2008), Springer-Verlag 37-44
    • (2008) LNCS , vol.4435 , pp. 37-44
    • Mandt, T.1    Tan, C.2
  • 18
    • 24144458508 scopus 로고    scopus 로고
    • A new two-party identity-based authenticated key agreement
    • Proceedings of the CT-RSA 2005, Springer-Verlag
    • McCullagh N., and Barreto P. A new two-party identity-based authenticated key agreement. Proceedings of the CT-RSA 2005. LNCS vol. 3376 (2005), Springer-Verlag 262-274
    • (2005) LNCS , vol.3376 , pp. 262-274
    • McCullagh, N.1    Barreto, P.2
  • 20
    • 84937389342 scopus 로고    scopus 로고
    • The gap-problems: a new class of problems for the security of cryptographic schemes
    • Proceedings of the PKC 2001, Springer-Verlag
    • Okamoto T., and Pointcheval D. The gap-problems: a new class of problems for the security of cryptographic schemes. Proceedings of the PKC 2001. LNCS vol. 1992 (2001), Springer-Verlag 104-118
    • (2001) LNCS , vol.1992 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 21
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • Proceedings of the CRYPTO 1984, Springer-Verlag
    • Shamir A. Identity based cryptosystems and signature schemes. Proceedings of the CRYPTO 1984. LNCS vol. 196 (1984), Springer-Verlag 47-53
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 22
    • 33947586742 scopus 로고    scopus 로고
    • Two-party authenticated key agreement in certificateless public key cryptography
    • Shi Y., and Li J. Two-party authenticated key agreement in certificateless public key cryptography. Wuhan University Journal of Natural Sciences 12 1 (2007) 71-74
    • (2007) Wuhan University Journal of Natural Sciences , vol.12 , Issue.1 , pp. 71-74
    • Shi, Y.1    Li, J.2
  • 23
    • 0038680685 scopus 로고    scopus 로고
    • Efficient ID-based authenticated key agreement protocol based on the Weil pairing
    • Shim K. Efficient ID-based authenticated key agreement protocol based on the Weil pairing. Electronics Letters 39 8 (2003) 653-654
    • (2003) Electronics Letters , vol.39 , Issue.8 , pp. 653-654
    • Shim, K.1
  • 24
    • 56149108570 scopus 로고    scopus 로고
    • Breaking the short certificateless signature scheme
    • Shim K. Breaking the short certificateless signature scheme. Information Sciences 179 3 (2009) 303-306
    • (2009) Information Sciences , vol.179 , Issue.3 , pp. 303-306
    • Shim, K.1
  • 25
    • 0037142442 scopus 로고    scopus 로고
    • An identity based authenticated key agreement protocol based on the Weil pairing
    • Smart N. An identity based authenticated key agreement protocol based on the Weil pairing. Electronics Letters 38 13 (2002) 630-632
    • (2002) Electronics Letters , vol.38 , Issue.13 , pp. 630-632
    • Smart, N.1
  • 26
    • 44549086712 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography
    • Wang F., and Zhang Y. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Computer Communications 31 10 (2008) 2142-2149
    • (2008) Computer Communications , vol.31 , Issue.10 , pp. 2142-2149
    • Wang, F.1    Zhang, Y.2
  • 27
  • 28
    • 67650682832 scopus 로고    scopus 로고
    • Asymmetric group key agreement
    • Proceedings of the EUROCRYPT 2009, Springer-Verlag
    • Wu Q., Mu Y., Susilo W., Qin B., and Domingo-Ferrer J. Asymmetric group key agreement. Proceedings of the EUROCRYPT 2009. LNCS vol. 5479 (2009), Springer-Verlag 153-170
    • (2009) LNCS , vol.5479 , pp. 153-170
    • Wu, Q.1    Mu, Y.2    Susilo, W.3    Qin, B.4    Domingo-Ferrer, J.5
  • 29
    • 38049060251 scopus 로고    scopus 로고
    • A new efficient ID-based authenticated key agreement protocol, Cryptology ePrint Archive
    • Report 2005/309
    • Q. Yuan, S. Li, A new efficient ID-based authenticated key agreement protocol, Cryptology ePrint Archive, Report 2005/309, .
    • Yuan, Q.1    Li, S.2
  • 30
    • 61849086789 scopus 로고    scopus 로고
    • A new certificateless aggregate signature scheme
    • Zhang L., and Zhang F. A new certificateless aggregate signature scheme. Computer Communications 32 6 (2009) 1079-1085
    • (2009) Computer Communications , vol.32 , Issue.6 , pp. 1079-1085
    • Zhang, L.1    Zhang, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.