-
1
-
-
85020598353
-
Identity-based cryptosystems and signature protocols
-
Proc. CRYPTO1984
-
Shamir A. Identity-based cryptosystems and signature protocols. LNCS 1984, vol. 196:47-53.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
0345490607
-
Certificateless public key cryptography
-
Springer-Verlag, Proceedings of ASIACRYPT 2003
-
Al-Riyami S., Paterson K.G. Certificateless public key cryptography. LNCS 2003, vol. 2894:452-473. Springer-Verlag.
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.1
Paterson, K.G.2
-
3
-
-
13944274129
-
Efficient authenticated key agreement protocol using self-certifed public keys from pairings
-
Shao Z. Efficient authenticated key agreement protocol using self-certifed public keys from pairings. Wuhan University Journal of Natural Sciences 2005, 10(1):267-270.
-
(2005)
Wuhan University Journal of Natural Sciences
, vol.10
, Issue.1
, pp. 267-270
-
-
Shao, Z.1
-
5
-
-
49949116357
-
Certificateless authenticated two-party key agreement protocols
-
Springer-Verlag, Proceedings of the ASIAN 2006
-
Mandt T., Tan C. Certificateless authenticated two-party key agreement protocols. LNCS 2008, vol. 4435:37-44. Springer-Verlag.
-
(2008)
LNCS
, vol.4435
, pp. 37-44
-
-
Mandt, T.1
Tan, C.2
-
6
-
-
33947586742
-
Two-party authenticated key agreement in certificateless public key cryptography
-
Shi Y., Li J. Two-party authenticated key agreement in certificateless public key cryptography. Wuhan University Journal of Natural Sciences 2007, 12(1):71-74.
-
(2007)
Wuhan University Journal of Natural Sciences
, vol.12
, Issue.1
, pp. 71-74
-
-
Shi, Y.1
Li, J.2
-
7
-
-
70350437139
-
Security in key agreement
-
two-party certificateless schemes, Master Thesis, University of Waterloo,
-
C. Swanson, Security in key agreement: two-party certificateless schemes, Master Thesis, University of Waterloo, 2008.
-
(2008)
-
-
Swanson, C.1
-
8
-
-
69949142503
-
Strongly secure certificateless key agreement
-
in: Pairing 2009,
-
G. Lippold, C. Boyd, J. Nieto, Strongly secure certificateless key agreement, in: Pairing 2009, 2009, pp. 206-230.
-
(2009)
, pp. 206-230
-
-
Lippold, G.1
Boyd, C.2
Nieto, J.3
-
9
-
-
73149101252
-
Simulatable certificateless two-party authenticated key agreement protocol
-
Zhang L., Zhang F., Wua Q., Domingo-Ferrer J. Simulatable certificateless two-party authenticated key agreement protocol. Information Sciences 2010, 180:1020-1030.
-
(2010)
Information Sciences
, vol.180
, pp. 1020-1030
-
-
Zhang, L.1
Zhang, F.2
Wua, Q.3
Domingo-Ferrer, J.4
-
11
-
-
77949302373
-
Provably secure certificateless two-party authenticated key agreement protocol without pairing
-
in: International Conference on Computational Intelligence and Security,
-
M. Geng, F. Zhang, Provably secure certificateless two-party authenticated key agreement protocol without pairing, in: International Conference on Computational Intelligence and Security, 2009, pp. 208-212.
-
(2009)
, pp. 208-212
-
-
Geng, M.1
Zhang, F.2
-
12
-
-
70449109236
-
A two-party certificateless authenticated key agreement protocol without pairing,
-
in: 2nd IEEE International Conference on Computer Science and Information Technology
-
M. Hou, Q. Xu, A two-party certificateless authenticated key agreement protocol without pairing, in: 2nd IEEE International Conference on Computer Science and Information Technology, 2009, pp. 412-416.
-
(2009)
, pp. 412-416
-
-
Hou, M.1
Xu, Q.2
-
13
-
-
79956037223
-
Strongly secure certificateless key exchange without pairing,
-
in: 6th ACM Symposium on Information, Computer and Communications Security,
-
G. Yang, C. Tan, Strongly secure certificateless key exchange without pairing, in: 6th ACM Symposium on Information, Computer and Communications Security, 2011, pp. 71-79.
-
(2011)
, pp. 71-79
-
-
Yang, G.1
Tan, C.2
-
14
-
-
80052632132
-
A pairing-free certificateless authenticated key agreement protocol
-
in press, doi:10.1002/dac.1265
-
D. He, J. Chen, J. Hu, A pairing-free certificateless authenticated key agreement protocol, International Journal of Communication Systems, (2011) in press doi:10.1002/dac.1265.
-
(2011)
International Journal of Communication Systems,
-
-
He, D.1
Chen, J.2
Hu, J.3
-
15
-
-
78049296439
-
A pairing-free identity-based authenticated key agreement scheme with minimal message exchanges
-
Cao X., Kou W. A pairing-free identity-based authenticated key agreement scheme with minimal message exchanges. Information Sciences 2010, 180:2895-2903.
-
(2010)
Information Sciences
, vol.180
, pp. 2895-2903
-
-
Cao, X.1
Kou, W.2
-
16
-
-
0027726717
-
Random oracles are practical
-
a paradigm for designing efficient protocols, in: Proc. 1st ACM Conf. Comput. Commun. Security,
-
M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in: Proc. 1st ACM Conf. Comput. Commun. Security, 1993, pp. 62-73.
-
(1993)
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
17
-
-
84855353789
-
An ID-based proxy signature schemes without bilinear pairings
-
in press, doi:10.1007/s12243-011-0244-0
-
D. He, J. Chen, J. Hu, An ID-based proxy signature schemes without bilinear pairings, Annals of Telecommunications, in press (). doi:10.1007/s12243-011-0244-0.
-
Annals of Telecommunications
-
-
He, D.1
Chen, J.2
Hu, J.3
-
18
-
-
80051571433
-
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
-
in press, doi:10.1016/j.inffus.2011.01.001
-
D. He, J. Chen, J. Hu, An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security, Information Fusion, in press (). doi:10.1016/j.inffus.2011.01.001.
-
Information Fusion
-
-
He, D.1
Chen, J.2
Hu, J.3
-
19
-
-
79959945808
-
An efficient identity-based blind signature scheme without bilinear pairings
-
He D., Chen J., Zhang R. An efficient identity-based blind signature scheme without bilinear pairings. Computers and Electrical Engineering 2011, 37(4):444-450.
-
(2011)
Computers and Electrical Engineering
, vol.37
, Issue.4
, pp. 444-450
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
20
-
-
4243180376
-
The random oracle methodology
-
(revisited)
-
Canetti R., Goldreich O., Halevi S. The random oracle methodology. Journal of ACM 2004, 51(4):557-594. (revisited).
-
(2004)
Journal of ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
|