메뉴 건너뛰기




Volumn 5922 LNCS, Issue , 2009, Pages 57-71

A study of two-party certificateless authenticated key-agreement protocols

Author keywords

Certificateless public key cryptography; Key agreement

Indexed keywords

AUTHENTICATED KEY EXCHANGE; CANETTI-KRAWCZYK MODEL; CERTIFICATELESS; CERTIFICATELESS PUBLIC KEY CRYPTOGRAPHY; FORMAL SECURITY MODELS; INCREASED FLEXIBILITY; KEY AGREEMENT; KEY AGREEMENT PROTOCOL; KEY-COMPROMISE IMPERSONATION; MAN IN THE MIDDLE ATTACKS;

EID: 77649258504     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10628-6_4     Document Type: Conference Paper
Times cited : (47)

References (19)
  • 1
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
    • Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2894 , pp. 452-473
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 2
    • 24144438230 scopus 로고    scopus 로고
    • Al-Riyami, S.S., Paterson, K.G.: CBE from CLE-PKE: A generic construction and efficient schemes. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 398-415. Springer, Heidelberg (2005)
    • Al-Riyami, S.S., Paterson, K.G.: CBE from CLE-PKE: A generic construction and efficient schemes. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 398-415. Springer, Heidelberg (2005)
  • 3
    • 52149104493 scopus 로고    scopus 로고
    • Boyen, X.: The uber-assumption family - a unified complexity framework for bilinear groups. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, 5209, pp. 39-56. Springer, Heidelberg (2008)
    • Boyen, X.: The uber-assumption family - a unified complexity framework for bilinear groups. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 39-56. Springer, Heidelberg (2008)
  • 4
    • 53449097686 scopus 로고    scopus 로고
    • A survey of certificateless encryption schemes and security models
    • Dent, A.W.: A survey of certificateless encryption schemes and security models. Int. J. Inf. Secur. 7(5), 349-377 (2008)
    • (2008) Int. J. Inf. Secur , vol.7 , Issue.5 , pp. 349-377
    • Dent, A.W.1
  • 5
    • 84937570422 scopus 로고
    • Self-certified public keys
    • Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
    • Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490-497. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 490-497
    • Girault, M.1
  • 6
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: A high-performance secure Diffie-Hellman protocol
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Krawczyk, H.: HMQV: A high-performance secure Diffie-Hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 7
    • 38149012093 scopus 로고    scopus 로고
    • LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, 4784, pp. 1-16. Springer, Heidelberg (2007)
    • LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
  • 8
    • 84958601057 scopus 로고    scopus 로고
    • A key recovery attack on discrete log-based schemes using a prime order subgroup
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Lim, C.H., Lee, P.J.: A key recovery attack on discrete log-based schemes using a prime order subgroup. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 249-263. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 249-263
    • Lim, C.H.1    Lee, P.J.2
  • 9
    • 69949142503 scopus 로고    scopus 로고
    • Lippold, G., Boyd, C., Nieto, J.G.: Strongly secure certificateless key agreement. In: Shacham, H. (ed.) Pairing 2009. LNCS, 5671, pp. 206-230. Springer, Heidelberg (2009)
    • Lippold, G., Boyd, C., Nieto, J.G.: Strongly secure certificateless key agreement. In: Shacham, H. (ed.) Pairing 2009. LNCS, vol. 5671, pp. 206-230. Springer, Heidelberg (2009)
  • 10
  • 11
    • 49949116357 scopus 로고    scopus 로고
    • Mandt, T.K., Tan, C.H.: Certificateless authenticated two-party key agreement protocols. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, 4435, pp. 37-44. Springer, Heidelberg (2008)
    • Mandt, T.K., Tan, C.H.: Certificateless authenticated two-party key agreement protocols. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 37-44. Springer, Heidelberg (2008)
  • 13
    • 67650696914 scopus 로고    scopus 로고
    • Key-compromise impersonation attacks on some certificateless key agreement protocols and two improved protocols
    • Meng, G., Futai, Z.: Key-compromise impersonation attacks on some certificateless key agreement protocols and two improved protocols. In: International Workshop on Education Technology and Computer Science, vol. 2, pp. 62-66 (2009)
    • (2009) International Workshop on Education Technology and Computer Science , vol.2 , pp. 62-66
    • Meng, G.1    Futai, Z.2
  • 14
    • 13944274129 scopus 로고    scopus 로고
    • Shao, Z.-h.: Efficient authenticated key agreement protocol using self-certified public keys from pairings.Wuhan University Journal of Natural Sciences 10(1), 267-270 (2005)
    • Shao, Z.-h.: Efficient authenticated key agreement protocol using self-certified public keys from pairings.Wuhan University Journal of Natural Sciences 10(1), 267-270 (2005)
  • 15
    • 33947586742 scopus 로고    scopus 로고
    • Two-party authenticated key agreement in certificateless public key cryptography
    • Shi, Y., Li, J.: Two-party authenticated key agreement in certificateless public key cryptography. Wuhan University Journal of Natural Sciences 12(1), 71-74 (2007)
    • (2007) Wuhan University Journal of Natural Sciences , vol.12 , Issue.1 , pp. 71-74
    • Shi, Y.1    Li, J.2
  • 17
    • 33947589417 scopus 로고    scopus 로고
    • Escrow-free certificate-based authenticated key agreement protocol from pairings
    • Wang, S., Cao, Z.: Escrow-free certificate-based authenticated key agreement protocol from pairings. Wuhan University Journal of Natural Sciences 12(1), 63-66 (2007)
    • (2007) Wuhan University Journal of Natural Sciences , vol.12 , Issue.1 , pp. 63-66
    • Wang, S.1    Cao, Z.2
  • 18
    • 33845888269 scopus 로고    scopus 로고
    • Efficient certificateless authenticated key agreement protocol from pairings
    • Wang, S., Cao, Z., Wang, L.: Efficient certificateless authenticated key agreement protocol from pairings. Wuhan University Journal of Natural Sciences 11(5), 1278-1282 (2006)
    • (2006) Wuhan University Journal of Natural Sciences , vol.11 , Issue.5 , pp. 1278-1282
    • Wang, S.1    Cao, Z.2    Wang, L.3
  • 19
    • 57049167103 scopus 로고    scopus 로고
    • Xia, L., Wang, S., Shen, J., Xu, G.: Breaking and repairing the certificateless key agreement protocol from ASIAN 2006. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, 4435, pp. 562-566. Springer, Heidelberg (2008)
    • Xia, L., Wang, S., Shen, J., Xu, G.: Breaking and repairing the certificateless key agreement protocol from ASIAN 2006. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 562-566. Springer, Heidelberg (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.