메뉴 건너뛰기




Volumn 1, Issue 3, 2009, Pages 181-199

One-round key exchange in the standard model

Author keywords

Authentication protocols; Key exchange; Standard model

Indexed keywords


EID: 77954616596     PISSN: 17530563     EISSN: 17530571     Source Type: Journal    
DOI: 10.1504/IJACT.2009.023466     Document Type: Article
Times cited : (37)

References (30)
  • 1
    • 24944516264 scopus 로고    scopus 로고
    • Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Abe, M., Gennaro, R., Kurosawa, K. and Shoup, V. (2005) 'Tag- KEM/DEM: a new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM', Paper presented in the Proceedings of the Advances in Cryptology EUROCRYPT 2005, Vol. 3494 of Lecture Notes in Computer Science, pp. 128-146, Springer. Available at: http://eprint.iacr.org/2005/027, Revised 11 October, 2006. (Pubitemid 41313950)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 128-146
    • Abe, M.1    Gennaro, R.2    Kurosawa, K.3    Shoup, V.4
  • 3
    • 35048832490 scopus 로고    scopus 로고
    • An uninstantiable random-oracle-model scheme for a hybridencryption problem
    • Paper presented in the 3027 of Lecture Notes in Computer Science
    • Bellare, M., Boldyreva, A. and Palacio, A. (2004) 'An uninstantiable random-oracle-model scheme for a hybridencryption problem', Paper presented in the Proceedings of the Advances in Cryptology - EUROCRYPT 2004, Vol. 3027 of Lecture Notes in Computer Science, pp. 171-188.
    • (2004) Proceedings of the Advances in Cryptology - EUROCRYPT 2004 , pp. 171-188
    • Bellare, M.1    Boldyreva, A.2    Palacio, A.3
  • 4
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols
    • Paper presented in the ACM Press
    • Bellare, M., Canetti, R. and Krawczyk, H. (1998) 'A modular approach to the design and analysis of authentication and key exchange protocols', Paper presented in the Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, pp. 419-428. ACM Press. Available at: http://www-cse.ucsd.edu/users/ mihir/papers/keydistribution.html.
    • (1998) Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 5
    • 85032128552 scopus 로고    scopus 로고
    • Security of the cipher block chaining message authentication code
    • DOI 10.1006/jcss.1999.1694
    • Bellare, M., Kilian, J. and Rogaway, P. (2000) 'The security of the cipher block chaining message authentication code', Journal of Computer and System Sciences, Vol. 61, pp. 362-399. Available at: http://www-cse.ucsd. edu/~mihir/ papers/cbc.html. (Pubitemid 32087266)
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • Boneh, D. and Franklin, M. (2001) 'Identity-based encryption from the weil pairing', in Kilian, J. (Ed.), Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Vol. 2139 of Lecture Notes in Computer Science, pp. 213-229. Springer Verlag. (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • Canetti, R. and Krawczyk, H. (2001) 'Analysis of key-exchange protocols and their use for building secure channels', Paper presented in the Proceedings of the Advances in Cryptology - Eurocrypt 2001, Vol. 2045 of Lecture Notes in Computer Science, pp. 453-474. Springer-Verlag. Available at: http://eprint.iacr.org/2001/040.ps.gz. (Pubitemid 33275848)
    • (2001) Lecture Notes in Computer Science , Issue.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 13
    • 84958745695 scopus 로고    scopus 로고
    • Adapting the weaknesses of the random oracle model to the generic group model
    • Paper presented in the, Lecture Notes in Computer Science, Springer
    • Dent, A.W. (2002) 'Adapting the weaknesses of the random oracle model to the generic group model', Paper presented in the Proceedings of the Advances in Cryptology - ASIACRYPT 2002, Lecture Notes in Computer Science, pp. 100-109. Springer.
    • (2002) Proceedings of the Advances in Cryptology - ASIACRYPT 2002 , pp. 100-109
    • Dent, A.W.1
  • 15
    • 0344839024 scopus 로고    scopus 로고
    • PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology
    • Dodis, Y. (2000) Exposure-Resilient Cryptography. PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology. Available at: http://theory.lcs.mit.edu/~yevgen/academic.html.
    • (2000) Exposure-Resilient Cryptography
    • Dodis, Y.1
  • 16
    • 31444435304 scopus 로고    scopus 로고
    • Secure hashed Diffie-Hellman over non-DDH groups
    • Paper presented in the 3027 of Lecture Notes in Computer Science, Springer. Available at: Cryptology ePrint Archive), Report 2004/099.
    • Gennaro, R., Krawczyk, H. and Rabin, T. (2004) 'Secure hashed Diffie-Hellman over non-DDH groups', Paper presented in the Proceedings of the Advances in Cryptology - EUROCRYPT 2004, Vol. 3027 of Lecture Notes in Computer Science, pp. 361-381. Springer. Available at: Cryptology ePrint Archive (http://eprint.iacr.org/2004/099), Report 2004/099.
    • (2004) Proceedings of the Advances in Cryptology - EUROCRYPT 2004 , pp. 361-381
    • Gennaro, R.1    Krawczyk, H.2    Rabin, T.3
  • 19
    • 38049004199 scopus 로고    scopus 로고
    • Direct chosen-ciphertext secure identity-based encryption in the standard model with short ciphertexts
    • Kiltz, E. (2006) 'Direct chosen-ciphertext secure identity-based encryption in the standard model with short ciphertexts', Cryptology ePrint Archive, Report 2006/122. Available at: http://eprint.iacr.org/2006/122.
    • (2006) Cryptology EPrint Archive, Report 2006/122
    • Kiltz, E.1
  • 20
    • 38049077895 scopus 로고    scopus 로고
    • Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman
    • T. Okamoto and X. Wang (Eds) 4450 of Lecture Notes in Computer Science. Springer
    • Kiltz, E. (2007) 'Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman', in T. Okamoto and X. Wang (Eds), Public Key Cryptography. Vol. 4450 of Lecture Notes in Computer Science. pp. 282-297, Springer.
    • (2007) Public Key Cryptography. , pp. 282-297
    • Kiltz, E.1
  • 21
    • 33746374619 scopus 로고    scopus 로고
    • Direct chosen-ciphertext secure identity-based key encapsulation with-out random oracles
    • Kiltz, E. and Galindo, D. (2006a) 'Direct chosen-ciphertext secure identity-based key encapsulation with-out random oracles', Cryptology ePrint Archive, Report 2006/034. Available at: http://eprint.iacr.org/2006/034.
    • (2006) Cryptology EPrint Archive, Report 2006/034
    • Kiltz, E.1    Galindo, D.2
  • 23
    • 85018066264 scopus 로고    scopus 로고
    • SKEME: A versatile secure key exchange mechanism for internet
    • Paper presented in the
    • Krawczyk, H. (1996) 'SKEME: a versatile secure key exchange mechanism for internet', Paper presented in the Proceedings of the SNDSS, Vol. 96, p.114.
    • (1996) Proceedings of the SNDSS , vol.96 , pp. 114
    • Krawczyk, H.1
  • 25
    • 38149012093 scopus 로고    scopus 로고
    • Stronger security of authenticated key exchange
    • W. Susilo, J.K. Liu and Y. Mu (Eds) 4784 of Lecture Notes in Computer Science, Springer
    • LaMacchia, B.A., Lauter, K. and Mityagin, A. (2007) 'Stronger security of authenticated key exchange', in W. Susilo, J.K. Liu and Y. Mu (Eds), ProvSec, Vol. 4784 of Lecture Notes in Computer Science, pp. 1-16. Springer.
    • (2007) ProvSec , pp. 1-16
    • Lamacchia, B.A.1    Lauter, K.2    Mityagin, A.3
  • 28
    • 0030086632 scopus 로고    scopus 로고
    • Randomness is linear in space
    • DOI 10.1006/jcss.1996.0004
    • Nisan, N. and Zuckerman, D. (1996) 'Randomness is linear in space', Journal Comp. and System Science, Vol. 52, pp. 43-52. (Pubitemid 126340848)
    • (1996) Journal of Computer and System Sciences , vol.52 , Issue.1 , pp. 43-52
    • Nisan, N.1    Zuckerman, D.2
  • 29
    • 70349885919 scopus 로고    scopus 로고
    • New identity-based authenticated key agreement protocols from pairings (without random oracles)
    • Wang, S., Cao, Z. and Choo, K-K.R. (2006) 'New identity-based authenticated key agreement protocols from pairings (without random oracles)', Cryptology ePrint Archive, Report 2006/446. Available at: http://eprint.iacr. org/.
    • (2006) Cryptology EPrint Archive, Report 2006/446
    • Wang, S.1    Cao, Z.2    Choo, K.-K.R.3
  • 30
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption without random oracles
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Waters, B. (2005) 'Efficient identity-based encryption without random oracles', Paper presented in the Proceedings of the Advances in Cryptology - EUROCRYPT 2005, Vol. 3494 of Lecture Notes in Computer Science, pp. 114-127. Springer. (Pubitemid 41313949)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 114-127
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.