메뉴 건너뛰기




Volumn 181, Issue 19, 2011, Pages 4318-4329

Provably secure one-round identity-based authenticated asymmetric group key agreement protocol

Author keywords

Asymmetric group key agreement; Bilinear map; Group key agreement; Identity based public key cryptography

Indexed keywords

ACTIVE SECURITY MODEL; BILINEAR MAP; CERTIFICATE MANAGEMENT; CIPHERTEXTS; DIFFIE HELLMAN; GROUP KEY AGREEMENT; GROUP KEY AGREEMENT PROTOCOLS; GROUP MEMBERS; IDENTITY-BASED; MULTI-SIGNATURE; PASSIVE ATTACKS; PROVABLY SECURE; PUBLIC-KEY CRYPTOSYSTEMS; SECURITY FEATURES;

EID: 79960186888     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2011.05.009     Document Type: Article
Times cited : (63)

References (29)
  • 1
    • 0031642585 scopus 로고    scopus 로고
    • A Modular Approach to the Design and Analysis of Authentication and Key Exchange
    • ACM
    • M. Bellare, R. Canetti, and H. Krawczyk A Modular Approach to the Design and Analysis of Authentication and Key Exchange Proceedings of STOC 1998 1998 ACM 419 428
    • (1998) Proceedings of STOC 1998 , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 2
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • LNCS Springer-Verlag
    • M. Bellare, and P. Rogaway Entity Authentication and Key Distribution Proceedings of CRYPTO 1993 LNCS vol. 773 1994 Springer-Verlag 232 249
    • (1994) Proceedings of CRYPTO 1993 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 0027726717 scopus 로고
    • Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
    • ACM
    • M. Bellare, and P. Rogaway Random Oracles are Practical: A Paradigm for Designing Efficient Protocols Proceedings of ACM CCS 1993 1993 ACM 62 73
    • (1993) Proceedings of ACM CCS 1993 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure against Dictionary Attacks
    • LNCS Springer-Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway Authenticated Key Exchange Secure against Dictionary Attacks Proceedings of EUROCRYPT 2000 LNCS vol. 1807 2000 Springer-Verlag 139 155
    • (2000) Proceedings of EUROCRYPT 2000 , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 5
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • D. Boneh, X. Boyen, and E.-J. Goh Hierarchical Identity based Encryption with Constant Size Ciphertext Proceedings of EUROCRYPT 2005 LNCS vol. 3494 2005 Springer-Verlag 440 456 (Pubitemid 41313968)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 6
    • 0037623983 scopus 로고    scopus 로고
    • Identity based Encryption from the Weil Pairing
    • D. Boneh, and M. Franklin Identity based Encryption from the Weil Pairing SIAM Journal of Computing 32 3 2003 586 615
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 7
    • 50849127145 scopus 로고    scopus 로고
    • Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
    • LNCS Springer-Verlag
    • E. Bresson, O. Chevassut, and D. Pointcheval Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case Proceedings of ASIACRYPT 2001 LNCS vol. 2248 2001 Springer-Verlag 290 309
    • (2001) Proceedings of ASIACRYPT 2001 , vol.2248 , pp. 290-309
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 8
    • 50849092893 scopus 로고    scopus 로고
    • Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
    • LNCS Springer-Verlag
    • E. Bresson, O. Chevassut, and D. Pointcheval Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions Proceedings of EUROCRYPT 2002 LNCS vol. 2332 2002 Springer-Verlag 321 336
    • (2002) Proceedings of EUROCRYPT 2002 , vol.2332 , pp. 321-336
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 10
    • 84948991087 scopus 로고
    • A Secure and Efficient Conference Key Distribution System
    • LNCS Springer-Verlag
    • M. Burmester, and Y. Desmedt A Secure and Efficient Conference Key Distribution System Proceedings of EUROCRYPT 1994 LNCS vol. 950 1995 Springer-Verlag 275 286
    • (1995) Proceedings of EUROCRYPT 1994 , vol.950 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 12
    • 78049296439 scopus 로고    scopus 로고
    • A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
    • X. Cao, W. Kou, and X. Du A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges Information Sciences 180 15 2010 2895 2903
    • (2010) Information Sciences , vol.180 , Issue.15 , pp. 2895-2903
    • Cao, X.1    Kou, W.2    Du, X.3
  • 13
    • 77958095782 scopus 로고    scopus 로고
    • A communication-efficient three-party password authenticated key exchange protocol
    • T. Chang, M. Hwang, and W. Yang A communication-efficient three-party password authenticated key exchange protocol Information Sciences 181 1 2011 217 226
    • (2011) Information Sciences , vol.181 , Issue.1 , pp. 217-226
    • Chang, T.1    Hwang, M.2    Yang, W.3
  • 14
    • 35048874197 scopus 로고    scopus 로고
    • Efficient ID-based Group Key Agreement with Bilinear Maps
    • LNCS Springer-Verlag
    • K. Choi, J. Hwang, and D. Lee Efficient ID-based Group Key Agreement with Bilinear Maps Proceedings of PKC 2004 LNCS vol. 2947 2004 Springer-Verlag 130 144
    • (2004) Proceedings of PKC 2004 , vol.2947 , pp. 130-144
    • Choi, K.1    Hwang, J.2    Lee, D.3
  • 16
    • 84955339164 scopus 로고    scopus 로고
    • Secure Integration of Asymmetric and Symmetric Encryption Schemes
    • LNCS Springer-Verlag
    • E. Fujisaki, and T. Okamoto Secure Integration of Asymmetric and Symmetric Encryption Schemes Proceedings of CRYPTO 1999 LNCS vol. 1666 1999 Springer-Verlag 537 554
    • (1999) Proceedings of CRYPTO 1999 , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 18
    • 67049155509 scopus 로고    scopus 로고
    • Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    • LNCS Springer-Verlag
    • M. Gorantla, C. Boyd, and J. Nieto Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols Proceedings of PKC 2009 LNCS vol. 5443 2009 Springer-Verlag 105 123
    • (2009) Proceedings of PKC 2009 , vol.5443 , pp. 105-123
    • Gorantla, M.1    Boyd, C.2    Nieto, J.3
  • 19
    • 78449313002 scopus 로고    scopus 로고
    • Provably secure identity-based authenticated key agreement protocols with malicious private key generators
    • H. Guo, Z. Li, Y. Mu, and X. Zhang Provably secure identity-based authenticated key agreement protocols with malicious private key generators Information Sciences 181 3 2011 628 647
    • (2011) Information Sciences , vol.181 , Issue.3 , pp. 628-647
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, X.4
  • 20
    • 23944461491 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • DOI 10.1007/s00145-004-0312-y
    • A. Joux A one round protocol for tripartite Diffie-Hellman Journal of Cryptology 17 4 2004 263 276 (Pubitemid 41201459)
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 263-276
    • Joux, A.1
  • 25
    • 85020598353 scopus 로고
    • Identity based Cryptosystems and Signature Schemes
    • LNCS Springer-Verlag
    • A. Shamir Identity based Cryptosystems and Signature Schemes Proceedings of CRYPTO'84 LNCS vol. 196 1984 Springer-Verlag 47 53
    • (1984) Proceedings of CRYPTO'84 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 27
    • 77955048000 scopus 로고    scopus 로고
    • Identity-based Authenticated Asymmetric Group Key Agreement Protocol
    • LNCS Springer-Verlag
    • L. Zhang, Q. Wu, B. Qin, and J. Domingo-Ferrer Identity-based Authenticated Asymmetric Group Key Agreement Protocol Proceedings of COCOON 2010 LNCS vol. 6196 2010 Springer-Verlag 510 519
    • (2010) Proceedings of COCOON 2010 , vol.6196 , pp. 510-519
    • Zhang, L.1    Wu, Q.2    Qin, B.3    Domingo-Ferrer, J.4
  • 28
    • 77956235295 scopus 로고    scopus 로고
    • Efficient many-to-one authentication with certificateless aggregate signatures
    • L. Zhang, B. Qin, Q. Wu, and F. Zhang Efficient many-to-one authentication with certificateless aggregate signatures Computer Networks 54 14 2010 2482 2491
    • (2010) Computer Networks , vol.54 , Issue.14 , pp. 2482-2491
    • Zhang, L.1    Qin, B.2    Wu, Q.3    Zhang, F.4
  • 29
    • 73149101252 scopus 로고    scopus 로고
    • Simulatable certificateless two-party authenticated key agreement protocol
    • L. Zhang, F. Zhang, Q. Wu, and J. Domingo-Ferrer Simulatable certificateless two-party authenticated key agreement protocol Information Sciences 180 6 2010 1020 1030
    • (2010) Information Sciences , vol.180 , Issue.6 , pp. 1020-1030
    • Zhang, L.1    Zhang, F.2    Wu, Q.3    Domingo-Ferrer, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.