메뉴 건너뛰기




Volumn , Issue , 2009, Pages 333-342

An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem

Author keywords

Authenticated key exchange; BDH problem; ID based; Twin Diffie Hellman

Indexed keywords

AUTHENTICATED KEY EXCHANGE; AUTHENTICATED KEY EXCHANGE PROTOCOLS; BILINEAR DIFFIE-HELLMAN PROBLEM; DIFFIE HELLMAN; DIFFIE-HELLMAN PROBLEM; ID-BASED; PROVABLY SECURE;

EID: 77952366226     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1533057.1533101     Document Type: Conference Paper
Times cited : (80)

References (19)
  • 1
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT, pages 139-155, 2000.
    • (2000) EUROCRYPT , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 2
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • D. R. Stinson, editor, CRYPTO, of, Springer
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In D. R. Stinson, editor, CRYPTO, volume 773 of Lecture Notes in Computer Science, pages 232-249. Springer, 1993.
    • (1993) Lecture Notes in Computer Science , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 0001940580 scopus 로고
    • Provably secure session key distribution: The three party case
    • ACM
    • M. Bellare and P. Rogaway. Provably secure session key distribution: the three party case. In STOC, pages 57-66. ACM, 1995.
    • (1995) STOC , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • J. Kilian, editor, CRYPTO, of, Springer
    • D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. In J. Kilian, editor, CRYPTO, volume 2139 of Lecture Notes in Computer Science, pages 213-229. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 5
    • 70349858083 scopus 로고    scopus 로고
    • Efficient one-round key exchange in the standard model
    • Y. Mu, W. Susilo, and J. Seberry, editors, ACISP, of, Springer
    • C. Boyd, Y. Cliff, J. G. Nieto, and K. G. Paterson. Efficient one-round key exchange in the standard model. In Y. Mu, W. Susilo, and J. Seberry, editors, ACISP, volume 5107 of Lecture Notes in Computer Science, pages 69-83. Springer, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5107 , pp. 69-83
    • Boyd, C.1    Cliff, Y.2    Nieto, J.G.3    Paterson, K.G.4
  • 6
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • B. Pfitzmann, editor, EUROCRYPT, of, Springer
    • R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In B. Pfitzmann, editor, EUROCRYPT, volume 2045 of Lecture Notes in Computer Science, pages 453-474. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 7
    • 44449176564 scopus 로고    scopus 로고
    • The twin diffie-hellman problem and applications
    • N. P. Smart, editor, EUROCRYPT, of, Springer
    • D. Cash, E. Kiltz, and V. Shoup. The twin diffie-hellman problem and applications. In N. P. Smart, editor, EUROCRYPT, volume 4965 of Lecture Notes in Computer Science, pages 127-145. Springer, 2008.
    • (2008) Lecture Notes in Computer Science , vol.4965 , pp. 127-145
    • Cash, D.1    Kiltz, E.2    Shoup, V.3
  • 8
    • 34347393777 scopus 로고    scopus 로고
    • Identity-based key agreement protocols from pairings
    • L. Chen, Z. Cheng, and N. P. Smart. Identity-based key agreement protocols from pairings. Int. J. Inf. Sec., 6 (4):213-241, 2007.
    • (2007) Int. J. Inf. Sec. , vol.6 , Issue.4 , pp. 213-241
    • Chen, L.1    Cheng, Z.2    Smart, N.P.3
  • 10
    • 33646805409 scopus 로고    scopus 로고
    • Examining indistinguishability-based proof models for key establishment protocols
    • B. K. Roy, editor, ASIACRYPT, of, Springer
    • K.-K. R. Choo, C. Boyd, and Y. Hitchcock. Examining indistinguishability- based proof models for key establishment protocols. In B. K. Roy, editor, ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, pages 585-604. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3788 , pp. 585-604
    • Choo, R.K.-K.1    Boyd, C.2    Hitchcock, Y.3
  • 11
    • 33646180371 scopus 로고    scopus 로고
    • On session key construction in provably-secure key establishment protocols
    • E. Dawson and S. Vaudenay, editors, Mycrypt, of, Springer
    • K.-K. R. Choo, C. Boyd, and Y. Hitchcock. On session key construction in provably-secure key establishment protocols. In E. Dawson and S. Vaudenay, editors, Mycrypt, volume 3715 of Lecture Notes in Computer Science, pages 116-131. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3715 , pp. 116-131
    • Choo, R.K.-K.1    Boyd, C.2    Hitchcock, Y.3
  • 12
    • 38149091828 scopus 로고    scopus 로고
    • Strongly-secure identity-based key agreement and anonymous extension
    • J. A. Garay, A. K. Lenstra, M. Mambo, and R. Peralta, editors, ISC, of, Springer
    • S. S. M. Chow and K.-K. R. Choo. Strongly-secure identity-based key agreement and anonymous extension. In J. A. Garay, A. K. Lenstra, M. Mambo, and R. Peralta, editors, ISC, volume 4779 of Lecture Notes in Computer Science, pages 203-220. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4779 , pp. 203-220
    • Chow, S.S.M.1    Choo, R.K.-K.2
  • 13
    • 33745179557 scopus 로고    scopus 로고
    • Hmqv: A high-performance secure diffie-hellman protocol
    • V. Shoup, editor, CRYPTO, of, Springer
    • H. Krawczyk. Hmqv: A high-performance secure diffie-hellman protocol. In V. Shoup, editor, CRYPTO, volume 3621 of Lecture Notes in Computer Science, pages 546-566. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 14
    • 33646756559 scopus 로고    scopus 로고
    • Modular security proofs for key agreement protocols
    • B. K. Roy, editor, ASIACRYPT, of, Springer
    • C. Kudla and K. G. Paterson. Modular security proofs for key agreement protocols. In B. K. Roy, editor, ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, pages 549-565. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3788 , pp. 549-565
    • Kudla, C.1    Paterson, K.G.2
  • 15
    • 38149012093 scopus 로고    scopus 로고
    • Stronger security of authenticated key exchange
    • W. Susilo, J. K. Liu, and Y. Mu, editors, ProvSec, of, Springer
    • B. A. LaMacchia, K. Lauter, and A. Mityagin. Stronger security of authenticated key exchange. In W. Susilo, J. K. Liu, and Y. Mu, editors, ProvSec, volume 4784 of Lecture Notes in Computer Science, pages 1-16. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4784 , pp. 1-16
    • Lamacchia, B.A.1    Lauter, K.2    Mityagin, A.3
  • 16
    • 24144458508 scopus 로고    scopus 로고
    • A new two-party identity-based authenticated key agreement
    • A. Menezes, editor, CT-RSA, of, Springer
    • N. McCullagh and P. S. L. M. Barreto. A new two-party identity-based authenticated key agreement. In A. Menezes, editor, CT-RSA, volume 3376 of Lecture Notes in Computer Science, pages 262-274. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 262-274
    • McCullagh, N.1    Barreto, P.S.L.M.2
  • 17
    • 84937389342 scopus 로고
    • The gap-problems: A new class of problems for the security of cryptographic schemes
    • K. Kim, editor, Public Key Cryptography, of, Springer
    • T. Okamoto and D. Pointcheval. The gap-problems: A new class of problems for the security of cryptographic schemes. In K. Kim, editor, Public Key Cryptography, 1volume 1992 of Lecture Notes in Computer Science, pages 104-118. Springer, 2001.
    • (1992) Lecture Notes in Computer Science , vol.1 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 18
    • 0037142442 scopus 로고    scopus 로고
    • An identity based authenticated key agreement protocol based on the weil pairing
    • N. Smart. An identity based authenticated key agreement protocol based on the weil pairing. Electronics Letters, 38:630-632, 2002.
    • (2002) Electronics Letters , vol.38 , pp. 630-632
    • Smart, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.