메뉴 건너뛰기




Volumn 180, Issue 15, 2010, Pages 2895-2903

A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges

Author keywords

Authenticated key agreement; Bilinear pairing; Elliptic curve; Identity based; Modular approach

Indexed keywords

AUTHENTICATED KEY AGREEMENT; BILINEAR PAIRING; ELLIPTIC CURVE; IDENTITY-BASED; MODULAR APPROACH;

EID: 78049296439     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2010.04.002     Document Type: Article
Times cited : (264)

References (22)
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • LNCS
    • D. Boneh, M. Franklin, Identity-based encryption from the weil pairing. in: Proceedings of the CRYPTO2001, LNCS, vol. 2139, pp.213-229, 2001.
    • (2001) Proceedings of the CRYPTO2001 , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 4
    • 77951274055 scopus 로고    scopus 로고
    • Identity-based authentication key agreement protocols without bilinear pairings
    • X. Cao, W. Kou, Y. Yu, and R. Sun Identity-based authentication key agreement protocols without bilinear pairings IEICE Trans. Fundam. E91-A 12 2008 3833 3836
    • (2008) IEICE Trans. Fundam. , vol.91 , Issue.12 , pp. 3833-3836
    • Cao, X.1    Kou, W.2    Yu, Y.3    Sun, R.4
  • 5
    • 69549116775 scopus 로고    scopus 로고
    • Identity-based anonymous remote authentication for value-added services in mobile networks
    • X. Cao, X. Zeng, W. Kou, and L. Hu Identity-based anonymous remote authentication for value-added services in mobile networks IEEE Trans. Veh. Technol. 58 7 2009 3508 3517
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.7 , pp. 3508-3517
    • Cao, X.1    Zeng, X.2    Kou, W.3    Hu, L.4
  • 6
    • 67849099096 scopus 로고    scopus 로고
    • Certificateless threshold ring signature
    • S. Chang, D.S. Wong, Y. Mu, and Z. Zhang Certificateless threshold ring signature Inform. Sci. 179 20 2009 3685 3696
    • (2009) Inform. Sci. , vol.179 , Issue.20 , pp. 3685-3696
    • Chang, S.1    Wong, D.S.2    Mu, Y.3    Zhang, Z.4
  • 7
    • 34347393777 scopus 로고    scopus 로고
    • Identity-based key agreement protocols from pairings
    • L. Chen, Z. Cheng, and N.P. Smart Identity-based key agreement protocols from pairings Int. J. Inf. Secur. 6 2007 213 241
    • (2007) Int. J. Inf. Secur. , Issue.6 , pp. 213-241
    • Chen, L.1    Cheng, Z.2    Smart, N.P.3
  • 9
    • 10444220191 scopus 로고    scopus 로고
    • Efficient identity-based authenticated key agreement protocol from pairings
    • Y. Choie, E. Jeong, and E. Lee Efficient identity-based authenticated key agreement protocol from pairings Appl. Math. Comput. 162 2005 179 188
    • (2005) Appl. Math. Comput. , Issue.162 , pp. 179-188
    • Choie, Y.1    Jeong, E.2    Lee, E.3
  • 10
    • 37549067642 scopus 로고    scopus 로고
    • Mobile IP registration in certificateless public key infrastructure
    • L. Dang, W. Kou, N. Dang, and H. Li Mobile IP registration in certificateless public key infrastructure IET Inf. Secur. 1 4 2007 167 173
    • (2007) IET Inf. Secur. , vol.1 , Issue.4 , pp. 167-173
    • Dang, L.1    Kou, W.2    Dang, N.3    Li, H.4
  • 11
    • 23944461491 scopus 로고    scopus 로고
    • A one-round protocol for tripartite Diffie-Hellman
    • A. Joux A one-round protocol for tripartite Diffie-Hellman J. Cryptology 17 2004 263 276
    • (2004) J. Cryptology , vol.17 , pp. 263-276
    • Joux, A.1
  • 12
    • 67649746889 scopus 로고    scopus 로고
    • An unknown key-share attack on the MQV key agreement protocol
    • B.S. Kaliski Jr An unknown key-share attack on the MQV key agreement protocol ACM Trans. Inf. Syst. Secur. 4 3 2001 275 288
    • (2001) ACM Trans. Inf. Syst. Secur. , vol.4 , Issue.3 , pp. 275-288
    • Kaliski Jr., B.S.1
  • 13
    • 33646756559 scopus 로고    scopus 로고
    • Modular security proofs for key agreement protocols
    • LNCS 3788
    • C. Kudla, K.G. Paterson, Modular security proofs for key agreement protocols, in: Proceedings of the ASIACRYPT 2005, LNCS 3788, 2005, pp. 549-565.
    • (2005) Proceedings of the ASIACRYPT 2005 , pp. 549-565
    • Kudla, C.1    Paterson, K.G.2
  • 15
    • 36248988077 scopus 로고    scopus 로고
    • On broadcast authentication in wireless sensor networks
    • K. Ren, W. Lou, K. Zeng, and P.J. Moran On broadcast authentication in wireless sensor networks IEEE Trans. Wireless Commun. 6 11 2007 4136 4144
    • (2007) IEEE Trans. Wireless Commun. , vol.6 , Issue.11 , pp. 4136-4144
    • Ren, K.1    Lou, W.2    Zeng, K.3    Moran, P.J.4
  • 16
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • LNCS
    • A. Shamir, Identity-based cryptosystems and signature schemes, in: Proceedings of CRYPTO1984, LNCS, vol.196, 1984, pp. 47-53.
    • (1984) Proceedings of CRYPTO1984 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 17
    • 40249088138 scopus 로고    scopus 로고
    • Certificate-based verifiably encrypted signatures from pairings
    • Z. Shao Certificate-based verifiably encrypted signatures from pairings Inf. Sci. 178 10 2008 2360 2373
    • (2008) Inf. Sci. , vol.178 , Issue.10 , pp. 2360-2373
    • Shao, Z.1
  • 18
    • 78049253256 scopus 로고    scopus 로고
    • Shamus Software Ltd., Miracl library
    • Shamus Software Ltd., Miracl library. .
  • 19
    • 0037142442 scopus 로고    scopus 로고
    • An identity-based authenticated key agreement protocol based on the Weil pairing
    • N.P. Smart An identity-based authenticated key agreement protocol based on the Weil pairing Electron. Lett. 38 2002 630 632
    • (2002) Electron. Lett. , Issue.38 , pp. 630-632
    • Smart, N.P.1
  • 20
    • 55949109421 scopus 로고    scopus 로고
    • An improved identity-based key agreement protocol and its security proof
    • S. Wang, Z. Cao, K.R. Choo, and L. Wang An improved identity-based key agreement protocol and its security proof Inf. Sci. 179 3 2009 307 318
    • (2009) Inf. Sci. , vol.179 , Issue.3 , pp. 307-318
    • Wang, S.1    Cao, Z.2    Choo, K.R.3    Wang, L.4
  • 21
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
    • Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway A survey of key management schemes in wireless sensor networks Comput. Commun. 30 2007 2314 2341 (Pubitemid 47285291)
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6
  • 22
    • 34248229210 scopus 로고    scopus 로고
    • An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
    • R.W. Zhu, G. Yang, and D.S. Wong An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices Theor. Comput. Sci. 9 378 2007 198 207
    • (2007) Theor. Comput. Sci. , vol.9 , Issue.378 , pp. 198-207
    • Zhu, R.W.1    Yang, G.2    Wong, D.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.