메뉴 건너뛰기




Volumn 37, Issue 2, 2011, Pages 205-217

Strongly secure identity-based authenticated key agreement protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATED KEY AGREEMENT; AUTHENTICATED KEY AGREEMENT PROTOCOLS; COMPUTATIONAL OVERHEADS; DIFFIE-HELLMAN ASSUMPTION; FORWARD SECRECY; ID-BASED; IDENTITY-BASED; MASTER KEY; PROVABLY SECURE; RANDOM ORACLE MODEL; SECURITY PROPERTIES;

EID: 79955705154     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compeleceng.2011.03.001     Document Type: Article
Times cited : (37)

References (29)
  • 1
    • 84949221411 scopus 로고    scopus 로고
    • Authenticated Diffie-Hellman key agreement protocols
    • Springer-Verlag
    • S. Blake-Wilson, and A. Menezes Authenticated Diffie-Hellman key agreement protocols Proceedings of the SAC 1998 LNCS vol. 1556 1999 Springer-Verlag 339 361
    • (1999) LNCS , vol.1556 , pp. 339-361
    • Blake-Wilson, S.1    Menezes, A.2
  • 2
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Proceedings of the CRYPTO 1984, Springer-Verlag
    • A. Shamir Identity-based cryptosystems and signature schemes Proceedings of the CRYPTO 1984 LNCS vol. 196 1984 Springer-Verlag 47 53
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 3
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Proceedings of the CRYPTO 1993, Springer-Verlag
    • M. Bellare, and P. Rogaway Entity authentication and key distribution Proceedings of the CRYPTO 1993 LNCS vol. 773 1993 Springer-Verlag 232 249
    • (1993) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Proceedings of the EUROCRYPT 2000, Springer-Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway Authenticated key exchange secure against dictionary attacks Proceedings of the EUROCRYPT 2000 LNCS vol. 1807 2000 Springer-Verlag 139 155
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • R. Canetti, and H. Krawczyk Analysis of key-exchange protocols and their use for building secure channels Proceedings of the EUROCRYPT 2001 LNCS vol. 245 2001 Springer-Verlag 453 474 (Pubitemid 33275848)
    • (2001) Lecture Notes in Computer Science , Issue.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 8
    • 38149012093 scopus 로고    scopus 로고
    • Stronger security of authenticated key exchange
    • Proceedings of the ProvSection 2007, Springer-Verlag
    • B.A. LaMacchia, K. Lauter, and A. Mityagin Stronger security of authenticated key exchange Proceedings of the ProvSection 2007 LNCS vol. 4784 2007 Springer-Verlag 1 16
    • (2007) LNCS , vol.4784 , pp. 1-16
    • Lamacchia, B.A.1    Lauter, K.2    Mityagin, A.3
  • 9
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh, and M. Franklin Identity-based encryption from the weil pairing Proceedings of the CRTPTO 2001 LNCS vol. 2139 2001 Springer-Verlag 213 229 (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 10
    • 0037142442 scopus 로고    scopus 로고
    • Identity-based authenticated key agreement protocol based on Weil pairing
    • DOI 10.1049/el:20020387
    • N.P. Smart An identity based authenticated key agreement protocol based on the Weil pairing Electron Lett 38 13 2002 630 632 (Pubitemid 34725603)
    • (2002) Electronics Letters , vol.38 , Issue.13 , pp. 630-632
    • Smart, N.P.1
  • 12
    • 33646180371 scopus 로고    scopus 로고
    • On session key construction in provably-secure key establishment protocols
    • Proceedings of the Mycrypt 2005, Springer-Verlag
    • K.K.R. Choo, C. Boyd, and Y. Hitchcock On session key construction in provably-secure key establishment protocols Proceedings of the Mycrypt 2005 LNCS vol. 3715 2005 Springer-Verlag 116 131
    • (2005) LNCS , vol.3715 , pp. 116-131
    • Choo, K.K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 13
    • 24144458508 scopus 로고    scopus 로고
    • A new two-party identity-based authenticated key agreement
    • Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
    • N. McCullagh, and P.S.L.M. Barreto A new two-party identity-based authenticated key agreement Proceedings of the CT-RSA 2005 LNCS vol. 3376 2005 Springer-Verlag 262 274 (Pubitemid 41231216)
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 262-274
    • McCullagh, N.1    Barreto, P.S.L.M.2
  • 15
    • 84937389342 scopus 로고    scopus 로고
    • The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
    • Public Key Cryptography
    • T. Okamoto, and D. Pointcheval The Gap-problems: a new class of problems for the security of cryptographic schemes Proceedings of the PKC 2001 LNCS vol. 1992 2001 Springer-Verlag 104 118 (Pubitemid 33232936)
    • (2001) Lecture Notes in Computer Science , Issue.1992 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 16
    • 33646184315 scopus 로고    scopus 로고
    • Efficient identity-based and authenticated key agreement protocol
    • Wang Y. Efficient identity-based and authenticated key agreement protocol. Cryptology ePrint archive, report 2005/108. < http://eprint.iacr. org/2005/108 >.
    • Cryptology EPrint Archive, Report 2005/108
    • Wang, Y.1
  • 18
    • 38149091828 scopus 로고    scopus 로고
    • Strongly-secure identity-based key agreement and anonymous extension
    • Proceedings of the ISC 2007, Springer-Verlag
    • S.S.M. Chow, and K.K.R. Choo Strongly-secure identity-based key agreement and anonymous extension Proceedings of the ISC 2007 LNCS vol. 4779 2007 Springer-Verlag 203 220
    • (2007) LNCS , vol.4779 , pp. 203-220
    • Chow, S.S.M.1    Choo, K.K.R.2
  • 19
    • 70349858083 scopus 로고    scopus 로고
    • Efficient one-round key exchange in the standard model
    • Proceedings of the ACISP 2008, Springer-Verlag
    • C. Boyd, Y. Cliff, J.G. Nieto, and K.G. Paterson Efficient one-round key exchange in the standard model Proceedings of the ACISP 2008 LNCS vol. 5107 2008 Springer-Verlag 69 83
    • (2008) LNCS , vol.5107 , pp. 69-83
    • Boyd, C.1    Cliff, Y.2    Nieto, J.G.3    Paterson, K.G.4
  • 20
    • 77952366226 scopus 로고    scopus 로고
    • An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
    • ACM
    • H. Huang, and Z. Cao An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem Proceedings of the ACM ASIACCS 2009 2009 ACM 333 342
    • (2009) Proceedings of the ACM ASIACCS 2009 , pp. 333-342
    • Huang, H.1    Cao, Z.2
  • 22
  • 23
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Proceedings of the CRYPTO 2002, Springer-Verlag
    • P.S.L.M. Barreto, K.Y. Kim, and B. Lynn Efficient algorithms for pairing-based cryptosystems Proceedings of the CRYPTO 2002 LNCS vol. 2442 2002 Springer-Verlag 354 368
    • (2002) LNCS , vol.2442 , pp. 354-368
    • Barreto, P.S.L.M.1    Kim, K.Y.2    Lynn, B.3
  • 24
    • 82955246861 scopus 로고    scopus 로고
    • Implementing the Tate pairing
    • Proceedings of the ANTS-V, Springer-Verlag
    • S.D. Galbraith, K. Harrison, and D. Soldera Implementing the Tate pairing Proceedings of the ANTS-V LNCS vol. 2369 2002 Springer-Verlag 324 337
    • (2002) LNCS , vol.2369 , pp. 324-337
    • Galbraith, S.D.1    Harrison, K.2    Soldera, D.3
  • 25
    • 69949142503 scopus 로고    scopus 로고
    • Strongly secure certificateless key agreement
    • Proceedings of the pairing 2009, Springer-Verlag
    • G. Lippold, C. Boyd, and J.G. Nieto Strongly secure certificateless key agreement Proceedings of the pairing 2009 LNCS vol. 5671 2009 Springer-Verlag 206 230
    • (2009) LNCS , vol.5671 , pp. 206-230
    • Lippold, G.1    Boyd, C.2    Nieto, J.G.3
  • 26
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: A high-performance secure Diffie-Hellman protocol
    • Proceedings of the CRYPTO 2005, Springer-Verlag
    • H. Krawczyk HMQV: a high-performance secure Diffie-Hellman protocol Proceedings of the CRYPTO 2005 LNCS vol. 3621 2005 Springer-Verlag 546 566
    • (2005) LNCS , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 27
    • 77954580101 scopus 로고    scopus 로고
    • Modeling leakage of ephemeral secrets in tripartite/group key exchange
    • Proceedings of the ICISC 2009, Springer-Verlag
    • M. Manulis, K. Suzuki, and B. Ustaoglu Modeling leakage of ephemeral secrets in tripartite/group key exchange Proceedings of the ICISC 2009 LNCS vol. 5984 2010 Springer-Verlag 16 33
    • (2010) LNCS , vol.5984 , pp. 16-33
    • Manulis, M.1    Suzuki, K.2    Ustaoglu, B.3
  • 28
    • 73149101252 scopus 로고    scopus 로고
    • Simulatable certificateless two-party authenticated key agreement protocol
    • L. Zhang, F. Zhang, Q. Wu, and J. Domingo-Ferrer Simulatable certificateless two-party authenticated key agreement protocol Info Sci 180 6 2010 1020 1030
    • (2010) Info Sci , vol.180 , Issue.6 , pp. 1020-1030
    • Zhang, L.1    Zhang, F.2    Wu, Q.3    Domingo-Ferrer, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.