-
2
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
New York, NY, USA: Springer-Verlag New York, Inc.
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. CRYPTO 84 on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1985, p. 47-53.
-
(1985)
Proc. CRYPTO 84 on Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
3
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Berlin, Heidelberg: Springer-Verlag
-
C. Gentry, "Certificate-based encryption and the certificate revocation problem," in Proc. EUROCRYPT'03. Berlin, Heidelberg: Springer-Verlag, 2003, p. 272-293.
-
(2003)
Proc. EUROCRYPT'03
, pp. 272-293
-
-
Gentry, C.1
-
4
-
-
0345490607
-
Certificateless public key cryptography
-
Springer-Verlag
-
S. S. Al-riyami, K. G. Paterson, and R. Holloway, "Certificateless public key cryptography," in Proc. Asiacrypt'03. Springer-Verlag, 2003, p. 452-473.
-
(2003)
Proc. Asiacrypt'03
, pp. 452-473
-
-
Al-riyami, S.S.1
Paterson, K.G.2
Holloway, R.3
-
5
-
-
1942473586
-
A comparison between traditional public key infrastructures and identity-based cryptography
-
K. Paterson and G. Price, "A comparison between traditional public key infrastructures and identity-based cryptography," Information Security, vol. 8, no. 16, pp. 57-72, 2003.
-
(2003)
Information Security
, vol.8
, Issue.16
, pp. 57-72
-
-
Paterson, K.1
Price, G.2
-
6
-
-
49949116357
-
Certificateless authenticated two-party key agreement protocols
-
Berlin, Heidelberg: Springer-Verlag
-
T. K. Mandt and C. H. Tan, "Certificateless authenticated two-party key agreement protocols," in Proc. ASIAN'06, Berlin, Heidelberg: Springer-Verlag, 2007, p. 37-44.
-
(2007)
Proc. ASIAN'06
, pp. 37-44
-
-
Mandt, T.K.1
Tan, C.H.2
-
7
-
-
57049167103
-
Breaking and repairing the certificateless key agreement protocol from asian 2006
-
Nov.
-
L. Xia, S. Wang, J. Shen, and G. Xu, "Breaking and repairing the certificateless key agreement protocol from asian 2006," Wuhan University Journal of Natural Sciences, vol. 13, no. 5, pp. 562-566, Nov. 2008.
-
(2008)
Wuhan University Journal of Natural Sciences
, vol.13
, Issue.5
, pp. 562-566
-
-
Xia, L.1
Wang, S.2
Shen, J.3
Xu, G.4
-
8
-
-
33845888269
-
Efficient certificateless authenticated key agreement protocol from pairings
-
Sept.
-
W. Shengbao, C. Zhenfu, , and W. Licheng, "Efficient certificateless authenticated key agreement protocol from pairings," Wuhan University Journal of Natural Sciences, vol. 11, no. 5, pp. 1278-1282, Sept. 2006.
-
(2006)
Wuhan University Journal of Natural Sciences
, vol.11
, Issue.5
, pp. 1278-1282
-
-
Shengbao, W.1
Zhenfu, C.2
Licheng, W.3
-
9
-
-
13944274129
-
Efficient authenticated key agreement protocol using self-certified public keys from pairings
-
Jan.
-
S. Zu-hua, "Efficient authenticated key agreement protocol using self-certified public keys from pairings," Wuhan University Journal of Natural Sciences, vol. 10, no. 1, pp. 267-270, Jan. 2005.
-
(2005)
Wuhan University Journal of Natural Sciences
, vol.10
, Issue.1
, pp. 267-270
-
-
Zu-hua, S.1
-
10
-
-
33947586742
-
Two-party authenticated key agreement in certificateless public key cryptography
-
Jan
-
S. Yijuan and L. Jianhua, "Two-party authenticated key agreement in certificateless public key cryptography," Wuhan University Journal of Natural Sciences, vol. 12, no. 1, pp. 71-74, Jan 2007.
-
(2007)
Wuhan University Journal of Natural Sciences
, vol.12
, Issue.1
, pp. 71-74
-
-
Yijuan, S.1
Jianhua, L.2
-
12
-
-
69949142503
-
Strongly secure certificateless key agreement
-
Berlin, Heidelberg, Germany: Springer- Verlag
-
G. Lippold, C. Boyd, and J. Gonzalez Nieto, "Strongly secure certificateless key agreement," in Proc. Pairing '09, Berlin, Heidelberg, Germany: Springer- Verlag, 2009, p. 206-230.
-
(2009)
Proc. Pairing '09
, pp. 206-230
-
-
Lippold, G.1
Boyd, C.2
Gonzalez Nieto, J.3
-
13
-
-
70350453453
-
Efficient certificateless authentication and key agreement (cl-ak) for grid computing
-
S. Wang, Z. Cao, and H. Bao, "Efficient certificateless authentication and key agreement (cl-ak) for grid computing," International Journal of Network Security, vol. 7, no. 3, pp. 342-347, 2006.
-
(2006)
International Journal of Network Security
, vol.7
, Issue.3
, pp. 342-347
-
-
Wang, S.1
Cao, Z.2
Bao, H.3
-
14
-
-
73549112438
-
On the security of certificateless authenticated key agreement protocol (cl-ak) for grid computing
-
Washington, DC, USA: IEEE Computer Society
-
M. Hou and Q. Xu, "On the security of certificateless authenticated key agreement protocol (cl-ak) for grid computing," in Proc. CHINAGRID '09, Washington, DC, USA: IEEE Computer Society, 2009, p. 128-133.
-
(2009)
Proc. CHINAGRID '09
, pp. 128-133
-
-
Hou, M.1
Xu, Q.2
-
15
-
-
72349092078
-
Two-party authenticated key agreement protocol from certificateless public key encryption scheme
-
vol. 0. Los Alamitos, CA, USA: IEEE Computer Society
-
M. Hou and Q. Xu, "Two-party authenticated key agreement protocol from certificateless public key encryption scheme," in Proc. Icmecg (International Conference on Management of e-Commerce and e-Government), 2009, vol. 0. Los Alamitos, CA, USA: IEEE Computer Society, 2009, p. 440-444.
-
(2009)
Proc. Icmecg (International Conference on Management of E-Commerce and E-Government), 2009
, pp. 440-444
-
-
Hou, M.1
Xu, Q.2
-
16
-
-
72349093675
-
Secure certificateless public key encryption without redundancy
-
Report 2008/487
-
Y. Sun and F. Zhang, "Secure certificateless public key encryption without redundancy," Cryptology ePrint Archive, Report 2008/487, 2008, http://eprint.iacr.org/.
-
(2008)
Cryptology ePrint Archive
-
-
Sun, Y.1
Zhang, F.2
-
17
-
-
70449713569
-
Secure and efficient two-party certificateless authenticated key agreement protocol
-
M. Hou and Q. Xu, "Secure and efficient two-party certificateless authenticated key agreement protocol," in Proc. CCCM (Colloquium on Computing, Communication, Control, and Management), 2009, vol. 3, p. 308-311.
-
Proc. CCCM (Colloquium on Computing, Communication, Control, and Management), 2009
, vol.3
, pp. 308-311
-
-
Hou, M.1
Xu, Q.2
-
18
-
-
33745833916
-
On constructing certificateless cryptosystems from identity based encryption
-
Springer-Verlag
-
B. Libert and J. jacques Quisquater, "On constructing certificateless cryptosystems from identity based encryption," in PKC 2006. Springer-Verlag, 2006, p. 474-490.
-
(2006)
PKC 2006
, pp. 474-490
-
-
Libert, B.1
Quisquater, J.J.2
-
19
-
-
73149101252
-
Simulatable certificateless two-party authenticated key agreement protocol
-
L. Zhang, F. Zhang, Q. Wu, and J. Domingo-Ferrer, "Simulatable certificateless two-party authenticated key agreement protocol," Inf. Sci., vol. 180, no. 6, pp. 1020-1030, 2010.
-
(2010)
Inf. Sci.
, vol.180
, Issue.6
, pp. 1020-1030
-
-
Zhang, L.1
Zhang, F.2
Wu, Q.3
Domingo-Ferrer, J.4
-
20
-
-
84949230533
-
Key agreement protocols and their security analysis
-
6th IMA International Conference on Cryptography and Coding, ser. Springer Berlin / Heidelberg
-
S. Blake-Wilson, D. Johnson, and A. Menezes, "Key agreement protocols and their security analysis," in 6th IMA International Conference on Cryptography and Coding, ser. Lecture Notes in Computer Science, vol. 1355. Springer Berlin / Heidelberg, 1997, p. 30-45.
-
(1997)
Lecture Notes in Computer Science
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
21
-
-
85030330304
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
New York, NY, USA: ACM
-
A. Menezes, S. Vanstone, and T. Okamoto, "Reducing elliptic curve logarithms to logarithms in a finite field," in Proc. STOC'91(Symposium on Theory of Computing), New York, NY, USA: ACM, 1991, p. 80-89.
-
(1991)
Proc. STOC'91(Symposium on Theory of Computing)
, pp. 80-89
-
-
Menezes, A.1
Vanstone, S.2
Okamoto, T.3
-
22
-
-
0032649638
-
The tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
-
July
-
G. Frey, M. Muller, and H.-G. Ruck, "The tate pairing and the discrete logarithm applied to elliptic curve cryptosystems," IEEE Transactions on Information Theory, vol. 45, no. 5, pp. 1717-1719, July 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.5
, pp. 1717-1719
-
-
Frey, G.1
Muller, M.2
Ruck, H.-G.3
-
24
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
London, UK: Springer-Verlag
-
P. S. L. M. Barreto, H. Y. Kim, B. Lynn, and M. Scott, "Efficient algorithms for pairing-based cryptosystems," in Proc. CRYPTO '02, London, UK: Springer-Verlag, 2002, p. 354-368.
-
(2002)
Proc. CRYPTO '02
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
|