메뉴 건너뛰기




Volumn 2, Issue , 2009, Pages 208-212

Provably secure certificateless two-party authenticated key agreement protocol without pairing

Author keywords

Authenticated key agreement; Certificateless public key cryptography; Computational Diffie Hellman problem; Pairing

Indexed keywords

AUTHENTICATED KEY AGREEMENT; AUTHENTICATED KEY AGREEMENT PROTOCOLS; BILINEAR MAP; CERTIFICATELESS; CERTIFICATELESS PUBLIC KEY CRYPTOGRAPHY; CRYPTOGRAPHIC PRIMITIVES; DIFFIE-HELLMAN PROBLEM; FORMAL SECURITY; FORMAL SECURITY MODELS; KEY AGREEMENT; KEY AGREEMENT PROTOCOL; MAN IN THE MIDDLE ATTACKS; MODULAR EXPONENTIATION; PARTY KEY AGREEMENT PROTOCOLS; PROVABLY SECURE; SECURITY MODEL;

EID: 77949302373     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIS.2009.152     Document Type: Conference Paper
Times cited : (47)

References (21)
  • 1
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman, "New directions in cryptography, IEEE Trans", Info. TH, 22, 644-654, 1976.
    • (1976) IEEE Trans, Info. TH , vol.22 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 2
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless Public Key Cryptography
    • Asiacrypt 2003
    • S. Al-Riyami and K.G. Paterson, "Certificateless Public Key Cryptography", Asiacrypt 2003, LNCS 2894, pp.452-473, 2003.
    • (2003) LNCS , vol.2894 , pp. 452-473
    • Al-Riyami, S.1    Paterson, K.G.2
  • 3
    • 33845888269 scopus 로고    scopus 로고
    • Efficient certificateless authenticated Key agreement protocols from pairings
    • S. Wang, Zh. Cao and L. Wang, "Efficient certificateless authenticated Key agreement protocols from pairings", WUJNS vol.11 No.5, pp.1278-1282, 2006.
    • (2006) WUJNS , vol.11 , Issue.5 , pp. 1278-1282
    • Wang, S.1    Cao, Z.2    Wang, L.3
  • 5
    • 33947586742 scopus 로고    scopus 로고
    • Two-party authenticated key agreement in certificateless public key cryptography
    • Y. Shi and J. Lin, "Two-party authenticated key agreement in certificateless public key cryptography", Wuhan University Journal of Natural Sciences, pp.071-074, 2007.
    • (2007) Wuhan University Journal of Natural Sciences , pp. 071-074
    • Shi, Y.1    Lin, J.2
  • 6
    • 77949283023 scopus 로고    scopus 로고
    • F. Wang and Y. Zhang, A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography, Cryptology ePrint Archive, Report 2007/220, 2007.
    • F. Wang and Y. Zhang, "A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography", Cryptology ePrint Archive, Report 2007/220, 2007.
  • 7
    • 49949116357 scopus 로고    scopus 로고
    • Certificateless authenticated two-party key agreement protocol
    • ASIAN
    • Tarjei K. Mandt and Chik How Tan, "Certificateless authenticated two-party key agreement protocol", ASIAN 2006, LNCS 4435, pp.37-44, 2007.
    • (2006) LNCS , vol.4435 , pp. 37-44
    • Mandt, T.K.1    How Tan, C.2
  • 8
    • 57049167103 scopus 로고    scopus 로고
    • Breaking and Repairing the Certificateless key agreement protocol from ASIAN 2006
    • X. Liang, SH. Wang, J. Shen and G. Xu, "Breaking and Repairing the Certificateless key agreement protocol from ASIAN 2006", Wuhan University Journal of Natural Sciences, vol. 13, no. 5, pp. 562-566, 2008.
    • (2008) Wuhan University Journal of Natural Sciences , vol.13 , Issue.5 , pp. 562-566
    • Liang, X.1    Wang, S.H.2    Shen, J.3    Xu, G.4
  • 9
    • 33645958856 scopus 로고    scopus 로고
    • Certificateless public key encryption without pairing, ISC 2005
    • J. Baek, R. Safavi-Naini and W. Susilo, "Certificateless public key encryption without pairing", ISC 2005. LNCS 3650, pp. 134-148, 2005.
    • (2005) LNCS , vol.3650 , pp. 134-148
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 10
    • 38349041777 scopus 로고    scopus 로고
    • Strongly Secure Certificateless Public Key Encryption without Pairing
    • 4856, pp
    • Y. Sun, F. Zhang, and J. Baek, "Strongly Secure Certificateless Public Key Encryption without Pairing", CANS 2007, LNCS 4856, pp.194-208, 2007.
    • (2007) LNCS , vol.CANS 2007 , pp. 194-208
    • Sun, Y.1    Zhang, F.2    Baek, J.3
  • 14
  • 15
    • 77949289870 scopus 로고    scopus 로고
    • L. Chen and C. Kudla, Identity-based Key Agreement from Pairings, International Journal of Information Security, 6 (2007), available: http://eprint.iacr.org/2006/199,2006
    • L. Chen and C. Kudla, "Identity-based Key Agreement from Pairings", International Journal of Information Security, 6 (2007), available: http://eprint.iacr.org/2006/199,2006
  • 16
    • 84949221411 scopus 로고    scopus 로고
    • Authenticated Diffie-Hellman key agreement protocols
    • SAC
    • S. Blake-Wilson and A. Menezes, "Authenticated Diffie-Hellman key agreement protocols", SAC 1998, LNCS 1556, pp. 339-361, 1999.
    • (1998) LNCS , vol.1556 , pp. 339-361
    • Blake-Wilson, S.1    Menezes, A.2
  • 17
    • 84945119254 scopus 로고
    • Entity authentication and key distribution, Advances in Cryptology-CRYPTO'93
    • M. Bellare and P. Rogaway, "Entity authentication and key distribution", Advances in Cryptology-CRYPTO'93, LNCS 773, pp.232-249, 1994.
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 18
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels, EUROCRYPT'01
    • R. Canetti and H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels", EUROCRYPT'01, LNCS 2045, pp. 453-474, 2001.
    • (2001) LNCS 2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 19
    • 38149012093 scopus 로고    scopus 로고
    • Stronger security of authenticated key exchange, ProvSec
    • B. LaMacchia, K. Lauter and A. Mityagin, "Stronger security of authenticated key exchange", ProvSec, LNCS 4784, pp.1-16, 2007.
    • (2007) LNCS , vol.4784 , pp. 1-16
    • LaMacchia, B.1    Lauter, K.2    Mityagin, A.3
  • 20
    • 0000537828 scopus 로고
    • Efficient Identifications and Signatures for Smart Cards, Crypto'89
    • C. P. Schnorr, "Efficient Identifications and Signatures for Smart Cards", Crypto'89, LNCS 435, pp. 239-251, 1990.
    • (1990) LNCS , vol.435 , pp. 239-251
    • Schnorr, C.P.1
  • 21
    • 84927727752 scopus 로고    scopus 로고
    • Security Proofs for Signature Schemes, EUROCRYPT'96
    • D. Pointcheval, J. Stern, "Security Proofs for Signature Schemes", EUROCRYPT'96, LNCS 1070, pp.387-398, 1996.
    • (1996) LNCS , vol.1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.