메뉴 건너뛰기




Volumn , Issue , 2011, Pages 802-806

An enhanced certificateless authenticated key agreement protocol

Author keywords

Authenticated key agreement; certificateless public key cryptography; efficiency; identity based public key cryptography; key generation; security

Indexed keywords

AUTHENTICATED KEY AGREEMENT; CERTIFICATELESS PUBLIC KEY CRYPTOGRAPHY; IDENTITY-BASED PUBLIC KEY CRYPTOGRAPHY; KEY GENERATION; SECURITY;

EID: 79955683763     PISSN: 17389445     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (16)

References (24)
  • 2
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • New York, NY, USA: Springer-Verlag New York, Inc.
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. CRYPTO 84 on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1985, p. 47-53.
    • (1985) Proc. CRYPTO 84 on Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 3
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • Berlin, Heidelberg: Springer-Verlag
    • C. Gentry, "Certificate-based encryption and the certificate revocation problem," in Proc. EUROCRYPT'03. Berlin, Heidelberg: Springer-Verlag, 2003, p. 272-293.
    • (2003) Proc. EUROCRYPT'03 , pp. 272-293
    • Gentry, C.1
  • 4
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Springer-Verlag
    • S. S. Al-riyami, K. G. Paterson, and R. Holloway, "Certificateless public key cryptography," in Proc. Asiacrypt'03. Springer-Verlag, 2003, p. 452-473.
    • (2003) Proc. Asiacrypt'03 , pp. 452-473
    • Al-riyami, S.S.1    Paterson, K.G.2    Holloway, R.3
  • 5
    • 1942473586 scopus 로고    scopus 로고
    • A comparison between traditional public key infrastructures and identity-based cryptography
    • K. Paterson and G. Price, "A comparison between traditional public key infrastructures and identity-based cryptography," Information Security, vol. 8, no. 16, pp. 57-72, 2003.
    • (2003) Information Security , vol.8 , Issue.16 , pp. 57-72
    • Paterson, K.1    Price, G.2
  • 6
    • 49949116357 scopus 로고    scopus 로고
    • Certificateless authenticated two-party key agreement protocols
    • Berlin, Heidelberg: Springer-Verlag
    • T. K. Mandt and C. H. Tan, "Certificateless authenticated two-party key agreement protocols," in Proc. ASIAN'06, Berlin, Heidelberg: Springer-Verlag, 2007, p. 37-44.
    • (2007) Proc. ASIAN'06 , pp. 37-44
    • Mandt, T.K.1    Tan, C.H.2
  • 7
    • 57049167103 scopus 로고    scopus 로고
    • Breaking and repairing the certificateless key agreement protocol from asian 2006
    • Nov.
    • L. Xia, S. Wang, J. Shen, and G. Xu, "Breaking and repairing the certificateless key agreement protocol from asian 2006," Wuhan University Journal of Natural Sciences, vol. 13, no. 5, pp. 562-566, Nov. 2008.
    • (2008) Wuhan University Journal of Natural Sciences , vol.13 , Issue.5 , pp. 562-566
    • Xia, L.1    Wang, S.2    Shen, J.3    Xu, G.4
  • 8
    • 33845888269 scopus 로고    scopus 로고
    • Efficient certificateless authenticated key agreement protocol from pairings
    • Sept.
    • W. Shengbao, C. Zhenfu, , and W. Licheng, "Efficient certificateless authenticated key agreement protocol from pairings," Wuhan University Journal of Natural Sciences, vol. 11, no. 5, pp. 1278-1282, Sept. 2006.
    • (2006) Wuhan University Journal of Natural Sciences , vol.11 , Issue.5 , pp. 1278-1282
    • Shengbao, W.1    Zhenfu, C.2    Licheng, W.3
  • 9
    • 13944274129 scopus 로고    scopus 로고
    • Efficient authenticated key agreement protocol using self-certified public keys from pairings
    • Jan.
    • S. Zu-hua, "Efficient authenticated key agreement protocol using self-certified public keys from pairings," Wuhan University Journal of Natural Sciences, vol. 10, no. 1, pp. 267-270, Jan. 2005.
    • (2005) Wuhan University Journal of Natural Sciences , vol.10 , Issue.1 , pp. 267-270
    • Zu-hua, S.1
  • 10
    • 33947586742 scopus 로고    scopus 로고
    • Two-party authenticated key agreement in certificateless public key cryptography
    • Jan
    • S. Yijuan and L. Jianhua, "Two-party authenticated key agreement in certificateless public key cryptography," Wuhan University Journal of Natural Sciences, vol. 12, no. 1, pp. 71-74, Jan 2007.
    • (2007) Wuhan University Journal of Natural Sciences , vol.12 , Issue.1 , pp. 71-74
    • Yijuan, S.1    Jianhua, L.2
  • 12
    • 69949142503 scopus 로고    scopus 로고
    • Strongly secure certificateless key agreement
    • Berlin, Heidelberg, Germany: Springer- Verlag
    • G. Lippold, C. Boyd, and J. Gonzalez Nieto, "Strongly secure certificateless key agreement," in Proc. Pairing '09, Berlin, Heidelberg, Germany: Springer- Verlag, 2009, p. 206-230.
    • (2009) Proc. Pairing '09 , pp. 206-230
    • Lippold, G.1    Boyd, C.2    Gonzalez Nieto, J.3
  • 13
    • 70350453453 scopus 로고    scopus 로고
    • Efficient certificateless authentication and key agreement (cl-ak) for grid computing
    • S. Wang, Z. Cao, and H. Bao, "Efficient certificateless authentication and key agreement (cl-ak) for grid computing," International Journal of Network Security, vol. 7, no. 3, pp. 342-347, 2006.
    • (2006) International Journal of Network Security , vol.7 , Issue.3 , pp. 342-347
    • Wang, S.1    Cao, Z.2    Bao, H.3
  • 14
    • 73549112438 scopus 로고    scopus 로고
    • On the security of certificateless authenticated key agreement protocol (cl-ak) for grid computing
    • Washington, DC, USA: IEEE Computer Society
    • M. Hou and Q. Xu, "On the security of certificateless authenticated key agreement protocol (cl-ak) for grid computing," in Proc. CHINAGRID '09, Washington, DC, USA: IEEE Computer Society, 2009, p. 128-133.
    • (2009) Proc. CHINAGRID '09 , pp. 128-133
    • Hou, M.1    Xu, Q.2
  • 15
    • 72349092078 scopus 로고    scopus 로고
    • Two-party authenticated key agreement protocol from certificateless public key encryption scheme
    • vol. 0. Los Alamitos, CA, USA: IEEE Computer Society
    • M. Hou and Q. Xu, "Two-party authenticated key agreement protocol from certificateless public key encryption scheme," in Proc. Icmecg (International Conference on Management of e-Commerce and e-Government), 2009, vol. 0. Los Alamitos, CA, USA: IEEE Computer Society, 2009, p. 440-444.
    • (2009) Proc. Icmecg (International Conference on Management of E-Commerce and E-Government), 2009 , pp. 440-444
    • Hou, M.1    Xu, Q.2
  • 16
    • 72349093675 scopus 로고    scopus 로고
    • Secure certificateless public key encryption without redundancy
    • Report 2008/487
    • Y. Sun and F. Zhang, "Secure certificateless public key encryption without redundancy," Cryptology ePrint Archive, Report 2008/487, 2008, http://eprint.iacr.org/.
    • (2008) Cryptology ePrint Archive
    • Sun, Y.1    Zhang, F.2
  • 18
    • 33745833916 scopus 로고    scopus 로고
    • On constructing certificateless cryptosystems from identity based encryption
    • Springer-Verlag
    • B. Libert and J. jacques Quisquater, "On constructing certificateless cryptosystems from identity based encryption," in PKC 2006. Springer-Verlag, 2006, p. 474-490.
    • (2006) PKC 2006 , pp. 474-490
    • Libert, B.1    Quisquater, J.J.2
  • 19
    • 73149101252 scopus 로고    scopus 로고
    • Simulatable certificateless two-party authenticated key agreement protocol
    • L. Zhang, F. Zhang, Q. Wu, and J. Domingo-Ferrer, "Simulatable certificateless two-party authenticated key agreement protocol," Inf. Sci., vol. 180, no. 6, pp. 1020-1030, 2010.
    • (2010) Inf. Sci. , vol.180 , Issue.6 , pp. 1020-1030
    • Zhang, L.1    Zhang, F.2    Wu, Q.3    Domingo-Ferrer, J.4
  • 20
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis
    • 6th IMA International Conference on Cryptography and Coding, ser. Springer Berlin / Heidelberg
    • S. Blake-Wilson, D. Johnson, and A. Menezes, "Key agreement protocols and their security analysis," in 6th IMA International Conference on Cryptography and Coding, ser. Lecture Notes in Computer Science, vol. 1355. Springer Berlin / Heidelberg, 1997, p. 30-45.
    • (1997) Lecture Notes in Computer Science , vol.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 21
  • 22
    • 0032649638 scopus 로고    scopus 로고
    • The tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
    • July
    • G. Frey, M. Muller, and H.-G. Ruck, "The tate pairing and the discrete logarithm applied to elliptic curve cryptosystems," IEEE Transactions on Information Theory, vol. 45, no. 5, pp. 1717-1719, July 1999.
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.5 , pp. 1717-1719
    • Frey, G.1    Muller, M.2    Ruck, H.-G.3
  • 24
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • London, UK: Springer-Verlag
    • P. S. L. M. Barreto, H. Y. Kim, B. Lynn, and M. Scott, "Efficient algorithms for pairing-based cryptosystems," in Proc. CRYPTO '02, London, UK: Springer-Verlag, 2002, p. 354-368.
    • (2002) Proc. CRYPTO '02 , pp. 354-368
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3    Scott, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.