메뉴 건너뛰기




Volumn 3046 LNCS, Issue PART 4, 2004, Pages 672-680

ID-based authenticated multiple-key agreement protocol from pairings

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; HEURISTIC METHODS; MOBILE SECURITY; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY;

EID: 77949692038     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24768-5_72     Document Type: Article
Times cited : (8)

References (25)
  • 3
    • 77949736299 scopus 로고    scopus 로고
    • IEEE P1363a D10 (Draft version 10): Standard Specifications for Public Key Cryptography: Additional Techniques
    • IEEE P1363 Working Group, available from
    • IEEE P1363 Working Group, 2001, IEEE P1363a D10 (Draft version 10): Standard Specifications for Public Key Cryptography: Additional Techniques, IEEE P1363 Working Group, Working draft (available from http://grouper.ieee.org/ groups/1363)
    • (2001) IEEE P1363 Working Group, Working draft
  • 5
    • 0035837210 scopus 로고    scopus 로고
    • Authenticated Key Agreement without Using One-way Hash Functions
    • Harn, L. and Lin, H.-Y.: Authenticated Key Agreement without Using One-way Hash Functions. Electronics Letters, Vol. 37, No. 10, (2001) 229-630
    • (2001) Electronics Letters , vol.37 , Issue.10 , pp. 229-630
    • Harn, L.1    Lin, H.-Y.2
  • 6
    • 0036643547 scopus 로고    scopus 로고
    • Robust Generalized MQV Key Agreement Protocol without Using One-way Hash Functions
    • Tseng, Y.-M: Robust Generalized MQV Key Agreement Protocol without Using One-way Hash Functions. Computer Standards and Interfaces, Vol. 24, (2002) 241-246
    • (2002) Computer Standards and Interfaces , vol.24 , pp. 241-246
    • Tseng, Y.-M.1
  • 7
    • 0042468097 scopus 로고    scopus 로고
    • Security of Robust Generalized MQV Key Agreement Protocol Without Using One-way Hash Functions
    • Shao, Z.: Security of Robust Generalized MQV Key Agreement Protocol Without Using One-way Hash Functions, Computer Standards and Interfaces, Vol. 25, (2003) 431-436
    • (2003) Computer Standards and Interfaces , vol.25 , pp. 431-436
    • Shao, Z.1
  • 9
    • 0141927192 scopus 로고    scopus 로고
    • Improved Authenticated Multiple-key Agreement Protocol Without Using Conventional One-way Function
    • Chien, H.-Y. and Jan, J.-K: Improved Authenticated Multiple-key Agreement Protocol Without Using Conventional One-way Function, Applied Mathematics and Computation, Vol. 147 (2004) 491-497
    • (2004) Applied Mathematics and Computation , vol.147 , pp. 491-497
    • Chien, H.-Y.1    Jan, J.-K.2
  • 10
    • 85020598353 scopus 로고
    • Identity-based Cryptosystems and Signature Schemes
    • Advances in Cryptology, Crypto, 196. Springer-Verlag
    • Shamir, A.: Identity-based Cryptosystems and Signature Schemes. Advances in Cryptology, Crypto 84, Lecture Notes in Computer Sciene, Vol. 196. Springer-Verlag. (1984) 47-53
    • (1984) Lecture Notes in Computer Sciene , vol.84 , pp. 47-53
    • Shamir, A.1
  • 11
    • 0024664858 scopus 로고
    • An ID-based Cryptosystem Based on the Discret Logarithm Problem
    • Tsuji, S. and Itoh, T.: An ID-based Cryptosystem Based on the Discret Logarithm Problem, IEEE Journal of Selected Areas in Communications, Vol. 7, No.4, (1989) 467-473
    • (1989) IEEE Journal of Selected Areas in Communications , vol.7 , Issue.4 , pp. 467-473
    • Tsuji, S.1    Itoh, T.2
  • 12
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based Encryption from the Weil Pairing
    • Advances in Cryptology, Crypto 2001, Springer-Verlag
    • Boneh, D. and Franklin, M.: Identity-based Encryption from the Weil Pairing. Advances in Cryptology, Crypto 2001, Lecture Notes in Computer Sciene, Vol. 2139. Springer-Verlag. (2001) 213-229
    • (2001) Lecture Notes in Computer Sciene , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 13
    • 77950151506 scopus 로고    scopus 로고
    • An Identity Based Encryption Scheme Based on Quadratic Residus
    • Crytography and Coding, Springer-Verlag
    • Cocks, C.: An Identity Based Encryption Scheme Based on Quadratic Residus. Crytography and Coding, Lecture Notes in Computer Sciene, Vol. 2260. Springer-Verlag. (2001) 360-363
    • (2001) Lecture Notes in Computer Sciene , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 14
    • 0037142442 scopus 로고    scopus 로고
    • Identity-based Authnticated Key Agreement Protocol Based on Weil Pairing
    • Smart, N.P.: Identity-based Authnticated Key Agreement Protocol Based on Weil Pairing, Electronics Letters, Vol. 38, No. 13, (2002) 630-632
    • (2002) Electronics Letters , vol.38 , Issue.13 , pp. 630-632
    • Smart, N.P.1
  • 15
    • 2642541518 scopus 로고    scopus 로고
    • Authenticated Three Party Key Agreement Protocols from Pairings. Cryptology ePrint Archive
    • Report 2002/035, available at
    • Al-Riyami, S. and Paterson K.G.: Authenticated Three Party Key Agreement Protocols from Pairings. Cryptology ePrint Archive, Report 2002/035, available at http://eprint.iacr.org/2002/035/ (2002)
    • (2002)
    • Al-Riyami, S.1    Paterson, K.G.2
  • 16
    • 33645437508 scopus 로고    scopus 로고
    • ID-based One Round Authenticated Tripartite Key Agreement Protocol with Pairings. Cryptology ePrint Archive
    • Report 2002/122, available at
    • Zhang, F., Liu, S. and Kim, K.J.: ID-based One Round Authenticated Tripartite Key Agreement Protocol with Pairings. Cryptology ePrint Archive, Report 2002/122, available at http://eprint.iacr.org/2002/122/ (2002)
    • (2002)
    • Zhang, F.1    Liu, S.2    Kim, K.J.3
  • 17
    • 8744292583 scopus 로고    scopus 로고
    • ID-based Tripartite Authenticated Key Agreement Protocols from Pairings. Cryptology ePrint Archive
    • Report 2003/004, available at
    • Nalla, D. and Reddy, K.C.: ID-based Tripartite Authenticated Key Agreement Protocols from Pairings. Cryptology ePrint Archive, Report 2003/004, available at http://eprint.iacr.org/2003/004/ (2003)
    • (2003)
    • Nalla, D.1    Reddy, K.C.2
  • 18
    • 0038680685 scopus 로고    scopus 로고
    • Efficient ID-based Authenticated Key Agreement Protocol Based on Weil Pairing
    • Shim, K.: Efficient ID-based Authenticated Key Agreement Protocol Based on Weil Pairing. Electronics Letters, Vol. 39, No. 8, (2003) 653-654
    • (2003) Electronics Letters , vol.39 , Issue.8 , pp. 653-654
    • Shim, K.1
  • 19
    • 0037461946 scopus 로고    scopus 로고
    • Efficient ID-based Key Agreement from Weil Pairing
    • Yi, X.: Efficient ID-based Key Agreement from Weil Pairing. Electronics Letters, Vol. 39, No. 2, (2003) 206-208
    • (2003) Electronics Letters , vol.39 , Issue.2 , pp. 206-208
    • Yi, X.1
  • 20
    • 10444247601 scopus 로고    scopus 로고
    • ID-based Tripartite Key Agreement with Signatures. Cryptology ePrint Archive
    • Report 2003/144, available at
    • Nalla, D.: ID-based Tripartite Key Agreement with Signatures. Cryptology ePrint Archive, Report 2003/144, available at http://eprint.iacr.org/2003/144/ (2003)
    • (2003)
    • Nalla, D.1
  • 21
    • 84949230533 scopus 로고    scopus 로고
    • Key Agreement Protocols and Their Security Analysis
    • Proceedings of the sixth IMA International Conference on Cryptography and Coding, Springer-Verlag
    • Blake-Wilson, S., Johnson, D. and Menezes, A.: Key Agreement Protocols and Their Security Analysis. Proceedings of the sixth IMA International Conference on Cryptography and Coding, Lecture Notes in Computer Sciene, Vol. 1355. Springer-Verlag. (1997) 310-324
    • (1997) Lecture Notes in Computer Sciene , vol.1355 , pp. 310-324
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 23
    • 35248867510 scopus 로고    scopus 로고
    • Efficient Identity based Signature Schemes Based on Pairings
    • Proceedings of 9th Workshop on Selected Areas in Cryptography, SAC, Springer-Verlag
    • Hess, F.: Efficient Identity based Signature Schemes Based on Pairings. Proceedings of 9th Workshop on Selected Areas in Cryptography, SAC 2002, Lecture Notes in Computer Sciene, Vol. 2595. Springer-Verlag. (2003) 310-324
    • (2002) Lecture Notes in Computer Sciene , vol.2595 , pp. 310-324
    • Hess, F.1
  • 24
    • 0000901529 scopus 로고    scopus 로고
    • Security Arguments for Digital Signatures and Blind Signatures
    • Pointcheval, D. and Stern, J.: Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology, No. 13, (2000) 361-396
    • (2000) Journal of Cryptology , Issue.13 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 25
    • 84945129491 scopus 로고    scopus 로고
    • Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
    • Advances in Cryptology, EuroCrypt 2001, Springer-Verlag
    • Verheul, E.R.: Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. Advances in Cryptology, EuroCrypt 2001, Lecture Notes in Computer Sciene, Vol. 2045. Springer-Verlag. (2001) 195-210
    • (2001) Lecture Notes in Computer Sciene , vol.2045 , pp. 195-210
    • Verheul, E.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.