메뉴 건너뛰기




Volumn 54, Issue 11-12, 2011, Pages 3143-3152

A new two-round certificateless authenticated key agreement protocol without bilinear pairings

Author keywords

Authenticated key agreement; Bilinear pairings; Certificateless cryptography; Elliptic curve; Provable security

Indexed keywords

AUTHENTICATED KEY AGREEMENT; BILINEAR PAIRING; CERTIFICATELESS; ELLIPTIC CURVE; PROVABLE SECURITY;

EID: 80052626402     PISSN: 08957177     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.mcm.2011.08.004     Document Type: Article
Times cited : (63)

References (20)
  • 1
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature protocols
    • Proc. CRYPTO1984
    • Shamir A. Identity-based cryptosystems and signature protocols. LNCS 1984, vol. 196:47-53.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 2
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Springer-Verlag, Proceedings of ASIACRYPT 2003
    • Al-Riyami S., Paterson K.G. Certificateless public key cryptography. LNCS 2003, vol. 2894:452-473. Springer-Verlag.
    • (2003) LNCS , vol.2894 , pp. 452-473
    • Al-Riyami, S.1    Paterson, K.G.2
  • 3
    • 13944274129 scopus 로고    scopus 로고
    • Efficient authenticated key agreement protocol using self-certifed public keys from pairings
    • Shao Z. Efficient authenticated key agreement protocol using self-certifed public keys from pairings. Wuhan University Journal of Natural Sciences 2005, 10(1):267-270.
    • (2005) Wuhan University Journal of Natural Sciences , vol.10 , Issue.1 , pp. 267-270
    • Shao, Z.1
  • 5
    • 49949116357 scopus 로고    scopus 로고
    • Certificateless authenticated two-party key agreement protocols
    • Springer-Verlag, Proceedings of the ASIAN 2006
    • Mandt T., Tan C. Certificateless authenticated two-party key agreement protocols. LNCS 2008, vol. 4435:37-44. Springer-Verlag.
    • (2008) LNCS , vol.4435 , pp. 37-44
    • Mandt, T.1    Tan, C.2
  • 6
    • 33947586742 scopus 로고    scopus 로고
    • Two-party authenticated key agreement in certificateless public key cryptography
    • Shi Y., Li J. Two-party authenticated key agreement in certificateless public key cryptography. Wuhan University Journal of Natural Sciences 2007, 12(1):71-74.
    • (2007) Wuhan University Journal of Natural Sciences , vol.12 , Issue.1 , pp. 71-74
    • Shi, Y.1    Li, J.2
  • 7
    • 70350437139 scopus 로고    scopus 로고
    • Security in key agreement
    • two-party certificateless schemes, Master Thesis, University of Waterloo,
    • C. Swanson, Security in key agreement: two-party certificateless schemes, Master Thesis, University of Waterloo, 2008.
    • (2008)
    • Swanson, C.1
  • 8
    • 69949142503 scopus 로고    scopus 로고
    • Strongly secure certificateless key agreement
    • in: Pairing 2009,
    • G. Lippold, C. Boyd, J. Nieto, Strongly secure certificateless key agreement, in: Pairing 2009, 2009, pp. 206-230.
    • (2009) , pp. 206-230
    • Lippold, G.1    Boyd, C.2    Nieto, J.3
  • 9
    • 73149101252 scopus 로고    scopus 로고
    • Simulatable certificateless two-party authenticated key agreement protocol
    • Zhang L., Zhang F., Wua Q., Domingo-Ferrer J. Simulatable certificateless two-party authenticated key agreement protocol. Information Sciences 2010, 180:1020-1030.
    • (2010) Information Sciences , vol.180 , pp. 1020-1030
    • Zhang, L.1    Zhang, F.2    Wua, Q.3    Domingo-Ferrer, J.4
  • 11
    • 77949302373 scopus 로고    scopus 로고
    • Provably secure certificateless two-party authenticated key agreement protocol without pairing
    • in: International Conference on Computational Intelligence and Security,
    • M. Geng, F. Zhang, Provably secure certificateless two-party authenticated key agreement protocol without pairing, in: International Conference on Computational Intelligence and Security, 2009, pp. 208-212.
    • (2009) , pp. 208-212
    • Geng, M.1    Zhang, F.2
  • 12
    • 70449109236 scopus 로고    scopus 로고
    • A two-party certificateless authenticated key agreement protocol without pairing,
    • in: 2nd IEEE International Conference on Computer Science and Information Technology
    • M. Hou, Q. Xu, A two-party certificateless authenticated key agreement protocol without pairing, in: 2nd IEEE International Conference on Computer Science and Information Technology, 2009, pp. 412-416.
    • (2009) , pp. 412-416
    • Hou, M.1    Xu, Q.2
  • 13
    • 79956037223 scopus 로고    scopus 로고
    • Strongly secure certificateless key exchange without pairing,
    • in: 6th ACM Symposium on Information, Computer and Communications Security,
    • G. Yang, C. Tan, Strongly secure certificateless key exchange without pairing, in: 6th ACM Symposium on Information, Computer and Communications Security, 2011, pp. 71-79.
    • (2011) , pp. 71-79
    • Yang, G.1    Tan, C.2
  • 14
    • 80052632132 scopus 로고    scopus 로고
    • A pairing-free certificateless authenticated key agreement protocol
    • in press, doi:10.1002/dac.1265
    • D. He, J. Chen, J. Hu, A pairing-free certificateless authenticated key agreement protocol, International Journal of Communication Systems, (2011) in press doi:10.1002/dac.1265.
    • (2011) International Journal of Communication Systems,
    • He, D.1    Chen, J.2    Hu, J.3
  • 15
    • 78049296439 scopus 로고    scopus 로고
    • A pairing-free identity-based authenticated key agreement scheme with minimal message exchanges
    • Cao X., Kou W. A pairing-free identity-based authenticated key agreement scheme with minimal message exchanges. Information Sciences 2010, 180:2895-2903.
    • (2010) Information Sciences , vol.180 , pp. 2895-2903
    • Cao, X.1    Kou, W.2
  • 16
    • 0027726717 scopus 로고
    • Random oracles are practical
    • a paradigm for designing efficient protocols, in: Proc. 1st ACM Conf. Comput. Commun. Security,
    • M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in: Proc. 1st ACM Conf. Comput. Commun. Security, 1993, pp. 62-73.
    • (1993) , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 17
    • 84855353789 scopus 로고    scopus 로고
    • An ID-based proxy signature schemes without bilinear pairings
    • in press, doi:10.1007/s12243-011-0244-0
    • D. He, J. Chen, J. Hu, An ID-based proxy signature schemes without bilinear pairings, Annals of Telecommunications, in press (). doi:10.1007/s12243-011-0244-0.
    • Annals of Telecommunications
    • He, D.1    Chen, J.2    Hu, J.3
  • 18
    • 80051571433 scopus 로고    scopus 로고
    • An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
    • in press, doi:10.1016/j.inffus.2011.01.001
    • D. He, J. Chen, J. Hu, An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security, Information Fusion, in press (). doi:10.1016/j.inffus.2011.01.001.
    • Information Fusion
    • He, D.1    Chen, J.2    Hu, J.3
  • 19
    • 79959945808 scopus 로고    scopus 로고
    • An efficient identity-based blind signature scheme without bilinear pairings
    • He D., Chen J., Zhang R. An efficient identity-based blind signature scheme without bilinear pairings. Computers and Electrical Engineering 2011, 37(4):444-450.
    • (2011) Computers and Electrical Engineering , vol.37 , Issue.4 , pp. 444-450
    • He, D.1    Chen, J.2    Zhang, R.3
  • 20
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology
    • (revisited)
    • Canetti R., Goldreich O., Halevi S. The random oracle methodology. Journal of ACM 2004, 51(4):557-594. (revisited).
    • (2004) Journal of ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.