메뉴 건너뛰기




Volumn 181, Issue 3, 2011, Pages 628-647

Provably secure identity-based authenticated key agreement protocols with malicious private key generators

Author keywords

Authenticated key agreement; ID based systems; Man in the middle attacks; Provable security

Indexed keywords

AUTHENTICATED KEY AGREEMENT; AUTHENTICATED KEY AGREEMENT PROTOCOLS; COMMONLY USED; CRYPTOGRAPHIC PRIMITIVES; CRYPTOGRAPHIC PROTOCOLS; ID-BASED; IDENTITY-BASED; KEY AGREEMENT; KEY AGREEMENT PROTOCOL; MAN IN THE MIDDLE ATTACKS; MASTER KEY; PRIVATE KEY; PRIVATE KEY GENERATORS; PROVABLE SECURITY; PROVABLY SECURE; SECURITY PROOFS; SECURITY PROPERTIES;

EID: 78449313002     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2010.09.032     Document Type: Article
Times cited : (18)

References (26)
  • 1
  • 3
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • LNCS
    • D. Boneh, X. Boyen, E. Goh, Hierarchical identity based encryption with constant size ciphertext, in: Proceedings of Eurocrypt'05, LNCS, vol. 3493, 2005, pp. 440-456.
    • (2005) Proceedings of Eurocrypt'05 , vol.3493 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.3
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the weil pairing
    • LNCS
    • D. Boneh, M. Franklin, Identity based encryption from the weil pairing. Advances in Cryptology-Crypto 2001, LNCS, vol. 2139, 2001, pp. 213-229.
    • (2001) Advances in Cryptology-Crypto 2001 , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 5
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • LNCS
    • D. Boneh, B. Lynn, H. Shacham, Short signatures from the weil pairing, in: Proceedings of Asiacrypt'01, LNCS, vol. 2248, 2001, pp. 514-532.
    • (2001) Proceedings of Asiacrypt'01 , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 6
    • 70349858083 scopus 로고    scopus 로고
    • Efficient one-round key exchange in the standard model
    • LNCS 2008
    • Colin Boyd, Yvonne Cliff, Juan Gonzalez Nieto, Kenneth G. Paterson, Efficient one-round key exchange in the standard model, in: Proceedings of ACISP, 2008, LNCS, vol. 5107, 2008, pp. 69-83.
    • (2008) Proceedings of ACISP , vol.5107 , pp. 69-83
    • Boyd, C.1    Cliff, Y.2    Gonzalez Nieto, J.3    Paterson, K.G.4
  • 9
    • 78049296439 scopus 로고    scopus 로고
    • A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
    • X. Cao, W. Kou, and X. Du A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges Information Sciences 180 15 2010 2895 2903
    • (2010) Information Sciences , vol.180 , Issue.15 , pp. 2895-2903
    • Cao, X.1    Kou, W.2    Du, X.3
  • 14
    • 10444220191 scopus 로고    scopus 로고
    • Efficient identity-based authticated key agreement protocol from pairings
    • Y. Choie, E. Jeong, and E. Lee Efficient identity-based authticated key agreement protocol from pairings Applied Mathematics and Computation 162 2005 179 188
    • (2005) Applied Mathematics and Computation , vol.162 , pp. 179-188
    • Choie, Y.1    Jeong, E.2    Lee, E.3
  • 15
    • 77952088182 scopus 로고    scopus 로고
    • Making the Diffie-Hellman protocol identity-based
    • Dario Fiore1, Rosario Gennaro, Making the Diffie-Hellman protocol identity-based, in: Topics in Cryptology - CT-RSA 2010, vol. 5985, 2010, pp. 165-178.
    • (2010) Topics in Cryptology - CT-RSA 2010 , vol.5985 , pp. 165-178
    • Fiore, D.1    Gennaro, R.2
  • 16
    • 78449304131 scopus 로고    scopus 로고
    • Novel and efficient identity-based authenticated key agreement protocols from weil pairings
    • LNCS
    • H. Guo, Y. Mu, X. Zhang, Z. Li, Novel and efficient identity-based authenticated key agreement protocols from weil pairings, in: UIC 2009, LNCS, vol. 5585, 2009, pp. 309-323.
    • (2009) UIC 2009 , vol.5585 , pp. 309-323
    • Guo, H.1    Mu, Y.2    Zhang, X.3    Li, Z.4
  • 17
    • 77949732329 scopus 로고    scopus 로고
    • Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
    • H. Guo, Y. Mu, X. Zhang, and Z. Li Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security International Journal of Security and Networks 5 2/3 2010 173 187
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 173-187
    • Guo, H.1    Mu, Y.2    Zhang, X.3    Li, Z.4
  • 18
    • 4944240675 scopus 로고    scopus 로고
    • Authenticated key exchange provably secure against the man-in-the-middle attack
    • A. Johnston, and P. Gemmell Authenticated key exchange provably secure against the man-in-the-middle attack Journal of Cryptology 15 2 2002 139 148
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 139-148
    • Johnston, A.1    Gemmell, P.2
  • 19
    • 84946844750 scopus 로고    scopus 로고
    • A One round protocol for tripartite Diffie-Hellman
    • LNCS
    • A. Joux, A One round protocol for tripartite Diffie-Hellman, in: Proceedings of Algorithmtic Number Theory Symposium IV, LNCS, vol. 1838, 2000, pp. 385-394.
    • (2000) Proceedings of Algorithmtic Number Theory Symposium IV , vol.1838 , pp. 385-394
    • Joux, A.1
  • 20
    • 24144458508 scopus 로고    scopus 로고
    • A new two-party identitybased authenticated key agreement
    • LNCS
    • N. McCullagh, P.S.L.M. Barreto, A new two-party identitybased authenticated key agreement, in: Proceedings of CT-RSA 2005, LNCS, vol. 3376, 2005, pp. 262-274.
    • (2005) Proceedings of CT-RSA 2005 , vol.3376 , pp. 262-274
    • McCullagh, N.1    Barreto, P.S.L.M.2
  • 21
    • 33645590972 scopus 로고    scopus 로고
    • An efficient ID-based authenticated key agreement protocol from pairings
    • LNCS
    • E. Ryu, E. Yoon, K. Yoo, An efficient ID-based authenticated key agreement protocol from pairings, in: Networking 2004, LNCS, vol. 3042, 2004, pp. 1458-1463.
    • (2004) Networking 2004 , vol.3042 , pp. 1458-1463
    • Ryu, E.1    Yoon, E.2    Yoo, K.3
  • 23
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • LNCS
    • A. Shamir, Identity-based cryptosystems and signature schemes, in: Proceedings of Advances in Cryptology-Crypto 1984, LNCS, vol. 196, 1984, pp. 47-53.
    • (1984) Proceedings of Advances in Cryptology-Crypto 1984 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 24
    • 0037142442 scopus 로고    scopus 로고
    • An identity based authenticated key agreement protocol based on the Weil pairing
    • N.P. Smart An identity based authenticated key agreement protocol based on the Weil pairing Electronics Letters 38 2002 630 632
    • (2002) Electronics Letters , vol.38 , pp. 630-632
    • Smart, N.P.1
  • 25
    • 55949109421 scopus 로고    scopus 로고
    • An improved identity-based key agreement protocol and its security proof
    • S. Wang, Z. Cao, and K. Choo An improved identity-based key agreement protocol and its security proof Information Sciences 179 3 2009 307 318
    • (2009) Information Sciences , vol.179 , Issue.3 , pp. 307-318
    • Wang, S.1    Cao, Z.2    Choo, K.3
  • 26
    • 38149028202 scopus 로고    scopus 로고
    • A new efficient ID-based authenticated key agreement protocol
    • Q. Yuan, S.A. Li, A new efficient ID-based authenticated key agreement protocol, Cryptology ePrint Archive, Report 2005/309.
    • (2005) Cryptology EPrint Archive, Report , pp. 309
    • Yuan, Q.1    Li, S.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.