메뉴 건너뛰기




Volumn 64, Issue 6, 2012, Pages 1914-1926

An efficient certificateless two-party authenticated key agreement protocol

Author keywords

Authenticated key agreement; Bilinear pairings; Certificateless cryptography; Elliptic curve; Provable security

Indexed keywords

AUTHENTICATED KEY AGREEMENT; BILINEAR PAIRING; CERTIFICATELESS; ELLIPTIC CURVE; PROVABLE SECURITY;

EID: 84865646945     PISSN: 08981221     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.camwa.2012.03.044     Document Type: Article
Times cited : (77)

References (20)
  • 2
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature protocols
    • LNCS
    • A. Shamir Identity-based cryptosystems and signature protocols Proc. CRYPTO1984 LNCS vol. 196 1984 47 53
    • (1984) Proc. CRYPTO1984 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 3
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • LNCS Springer-Verlag
    • S. Al-Riyami, and K.G. Paterson Certificateless public key cryptography Proceedings of ASIACRYPT 2003 LNCS vol. 2894 2003 Springer-Verlag 452 473
    • (2003) Proceedings of ASIACRYPT 2003 , vol.2894 , pp. 452-473
    • Al-Riyami, S.1    Paterson, K.G.2
  • 4
    • 13944274129 scopus 로고    scopus 로고
    • Efficient authenticated key agreement protocol using self-certified public keys from pairings
    • Z. Shao Efficient authenticated key agreement protocol using self-certified public keys from pairings Wuhan University Journal of Natural Sciences 10 1 2005 267 270
    • (2005) Wuhan University Journal of Natural Sciences , vol.10 , Issue.1 , pp. 267-270
    • Shao, Z.1
  • 6
    • 49949116357 scopus 로고    scopus 로고
    • Certificateless authenticated two-party key agreement protocols
    • LNCS Springer-Verlag
    • T. Mandt, and C. Tan Certificateless authenticated two-party key agreement protocols Proceedings of the ASIAN 2006 LNCS vol. 4435 2008 Springer-Verlag 37 44
    • (2008) Proceedings of the ASIAN 2006 , vol.4435 , pp. 37-44
    • Mandt, T.1    Tan, C.2
  • 7
    • 33947586742 scopus 로고    scopus 로고
    • Two-party authenticated key agreement in certificateless public key cryptography
    • Y. Shi, and J. Li Two-party authenticated key agreement in certificateless public key cryptography Wuhan University Journal of Natural Sciences 12 1 2007 71 74
    • (2007) Wuhan University Journal of Natural Sciences , vol.12 , Issue.1 , pp. 71-74
    • Shi, Y.1    Li, J.2
  • 9
    • 69949142503 scopus 로고    scopus 로고
    • Strongly secure certificateless key agreement
    • G. Lippold, C. Boyd, J. Nieto, Strongly secure certificateless key agreement. In Pairing 2009, 2009, pp. 206-230.
    • (2009) Pairing 2009 , pp. 206-230
    • Lippold, G.1    Boyd, C.2    Nieto, J.3
  • 10
    • 73149101252 scopus 로고    scopus 로고
    • Simulatable certificateless two-party authenticated key agreement protocol
    • L. Zhang, F. Zhang, Q. Wua, and J. Domingo-Ferrer Simulatable certificateless two-party authenticated key agreement protocol Information Sciences 180 2010 1020 1030
    • (2010) Information Sciences , vol.180 , pp. 1020-1030
    • Zhang, L.1    Zhang, F.2    Wua, Q.3    Domingo-Ferrer, J.4
  • 15
    • 80052632132 scopus 로고    scopus 로고
    • A pairing-free certificateless authenticated key agreement protocol
    • D. He, J. Chen, and J. Hu A pairing-free certificateless authenticated key agreement protocol International Journal of Communication Systems 25 2 2012 221 230
    • (2012) International Journal of Communication Systems , vol.25 , Issue.2 , pp. 221-230
    • He, D.1    Chen, J.2    Hu, J.3
  • 16
    • 80052626402 scopus 로고    scopus 로고
    • A new two-round certificateless authenticated key agreement protocol without bilinear pairings
    • D. He, Y. Chen, J. Chen, R. Zhang, and W. Han A new two-round certificateless authenticated key agreement protocol without bilinear pairings Mathematical and Computer Modelling 54 11-12 2011 3143 3152
    • (2011) Mathematical and Computer Modelling , vol.54 , Issue.1112 , pp. 3143-3152
    • He, D.1    Chen, Y.2    Chen, J.3    Zhang, R.4    Han, W.5
  • 17
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • LNCS Springer-Verlag
    • M. Bellare, and P. Rogaway Entity authentication and key distribution Proceedings of the CRYPTO 1993 LNCS vol. 773 1993 Springer-Verlag 232 249
    • (1993) Proceedings of the CRYPTO 1993 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 19
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare, P. Rogaway, Random oracles are practical: A paradigm for designing efficient protocols, in: Proc. 1st ACM Conf. Comput. Commun. Security, 1993, pp. 62-73.
    • (1993) Proc. 1st ACM Conf. Comput. Commun. Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.