메뉴 건너뛰기




Volumn 81, Issue , 2008, Pages 39-46

ID-based one-pass authenticated key establishment

Author keywords

[No Author keywords available]

Indexed keywords

APPROPRIATE MODELS; AUTHENTICATED KEY ESTABLISHMENT PROTOCOLS; AUTHENTICATED KEY ESTABLISHMENTS; BILINEAR DIFFIE-HELLMAN PROBLEM; CERTIFICATE-BASED; CURRENT GAP; FORMAL MODEL; FORMAL SECURITY MODELS; ID-BASED; NEW PROTOCOL; ONE-PASS; RANDOM ORACLE MODEL; SECURITY LEVEL;

EID: 84871235333     PISSN: 14451336     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Article
Times cited : (28)

References (26)
  • 1
    • 33749033076 scopus 로고    scopus 로고
    • Escrowfree encryption supporting cryptographic work ow
    • Al-Riyami, S. S., Malone-Lee, J.&Smart, N. P. (2006), 'Escrowfree encryption supporting cryptographic work ow.', Int. J. Inf. Sec. 5(4), 217-229.
    • (2006) Int. J. Inf. Sec. , vol.5 , Issue.4 , pp. 217-229
    • Alriyami, S.S.1    Malonelee, J.2    Smart, N.P.3
  • 3
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure against Dictionary Attacks
    • of LNCS, Springer
    • Bellare, M., Pointcheval, D.&Rogaway, P. (2000), Authenticated Key Exchange Secure against Dictionary Attacks, in 'Advances in Cryptology- EUROCRYPT'00', Vol. 1807 of LNCS, Springer, pp. 139-155.
    • (2000) Advances in Cryptology- EUROCRYPT'00 , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 4
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • of LNCS, Springer
    • Bellare, M.&Rogaway, P. (1993), Entity Authentication and Key Distribution, in 'Advances in Cryptology-CRYPTO'93', Vol. 773 of LNCS, Springer, pp. 232-249.
    • (1993) Advances in Cryptology-CRYPTO'93 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 84871201546 scopus 로고    scopus 로고
    • An IBE Scheme to Exchange Authenticated Secret Keys
    • Report 2004/071
    • Benits Jr, W.&Terada, R. (2004), 'An IBE Scheme to Exchange Authenticated Secret Keys', Cryptology ePrint Archive, Report 2004/071. http://eprint.iacr.org/2004/071.
    • (2004) Cryptology ePrint Archive
    • Benits Jr., W.1    Terada, R.2
  • 8
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • of LNCS, Springer
    • Boneh, D.&Franklin, M. (2001), Identity-Based Encryption from the Weil Pairing, in 'Advances in Cryptology-CRYPTO'01', Vol. 2139 of LNCS, Springer, pp. 213-229.
    • (2001) Advances in Cryptology-CRYPTO'01 , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • of LNCS, Springer
    • Canetti, R.&Krawczyk, H. (2001), Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, in 'Advances in Cryptology- EUROCRYPT'01', Vol. 2045 of LNCS, Springer, pp. 453-474.
    • (2001) Advances in Cryptology- EUROCRYPT'01 , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 10
    • 36248932062 scopus 로고    scopus 로고
    • Identity-based Key Agreement Protocols From Pairings
    • Report 2006/199
    • Chen, L., Cheng, Z.&Smart, N. (2006), 'Identity-based Key Agreement Protocols From Pairings', Cryptology ePrint Archive, Report 2006/199. http://eprint.iacr.org/2006/199.
    • (2006) Cryptology ePrint Archive
    • Chen, L.1    Cheng, Z.2    Smart, N.3
  • 11
    • 10444246846 scopus 로고    scopus 로고
    • Identity Based Authenticated Key Agreement Protocols from Pairings
    • Report 2002/184
    • Chen, L.&Kudla, C. (2002), 'Identity Based Authenticated Key Agreement Protocols from Pairings', Cryptology ePrint Archive, Report 2002/184. http://eprint.iacr.org/2002/184.
    • (2002) Cryptology ePrint Archive
    • Chen, L.1    Kudla, C.2
  • 13
    • 84871235031 scopus 로고    scopus 로고
    • Key Agreement from Signatures: Improved Protocols and Anonymous Extension
    • Report 2007/018
    • Chow, S.&Choo, K.-K. (2007), 'Key Agreement from Signatures: Improved Protocols and Anonymous Extension', Cryptology ePrint Archive, Report 2007/018. http://eprint.iacr.org/2007/018.
    • (2007) Cryptology ePrint Archive
    • Chow, S.1    Choo, K.-K.2
  • 14
    • 33645962801 scopus 로고    scopus 로고
    • Hybrid Signcryption Schemes with Outsider Security
    • of LNCS, Springer
    • Dent, A. (2005), Hybrid Signcryption Schemes with Outsider Security, in 'Information Security, 8th International Conference-ISC'05', Vol. 3650 of LNCS, Springer, pp. 203-217.
    • (2005) Information Security, 8th International Conference-ISC'05 , vol.3650 , pp. 203-217
    • Dent, A.1
  • 15
    • 35048839833 scopus 로고    scopus 로고
    • Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
    • of LNCS, Springer
    • Dodis, Y., Gennaro, R., Håstad, J., Krawczyk, H.&Rabin, T. (2004), Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes, in 'Advances in Cryptology-CRYPTO'04', Vol. 3152 of LNCS, Springer.
    • (2004) Advances in Cryptology-CRYPTO'04 , vol.3152
    • Dodis, Y.1    Gennaro, R.2    Håstad, J.3    Krawczyk, H.4    Rabin, T.5
  • 17
    • 38349008957 scopus 로고    scopus 로고
    • On the Connection Between Signcryption and One-pass Key Establishment
    • of LNCS, Springer-Verlag, To appear
    • Gorantla, M., Boyd, C.&González Nieto, J. (2007), On the Connection Between Signcryption and One-pass Key Establishment, in 'Proc. of the 11th IMA Intl. Conf. on Cryptography and Coding'07', Vol. 4887 of LNCS, Springer-Verlag, pp. 277-301. To appear.
    • (2007) Proc. of the 11th IMA Intl. Conf. on Cryptography and Coding'07 , vol.4887 , pp. 277-301
    • Gorantla, M.1    Boyd, C.2    Nieto, J.G.3
  • 18
    • 35248867510 scopus 로고    scopus 로고
    • Efficient Identity Based Signature Schemes Based on Pairings
    • of LNCS, Springer-Verlag
    • Hess, F. (2003), Efficient Identity Based Signature Schemes Based on Pairings, in 'Proc. of the 9th Workshop on Selected Areas in Cryptography- SAC '02', Vol. 2595 of LNCS, Springer-Verlag, pp. 310-324.
    • (2003) Proc. of the 9th Workshop on Selected Areas in Cryptography- SAC '02 , vol.2595 , pp. 310-324
    • Hess, F.1
  • 19
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: A High-Performance Secure Diefficiencye-Hellman Protocol
    • of LNCS, Springer
    • Krawczyk, H. (2005), HMQV: A High-Performance Secure Diefficiencye-Hellman Protocol, in 'Advances in Cryptology-CRYPTO'05', Vol. 3621 of LNCS, Springer, pp. 546-566.
    • (2005) Advances in Cryptology-CRYPTO'05 , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 20
    • 54249158637 scopus 로고    scopus 로고
    • Stronger Security of Authenticated Key Exchange
    • Report 2006/073, To appear in ProvSec 2007
    • LaMacchia, B., Lauter, K.&Mityagin, A. (2006), 'Stronger Security of Authenticated Key Exchange', Cryptology ePrint Archive, Report 2006/073. http://eprint.iacr.org/2006/073 To appear in ProvSec 2007.
    • (2006) Cryptology ePrint Archive
    • Lamacchia, B.1    Lauter, K.2    Mityagin, A.3
  • 22
    • 1642414982 scopus 로고    scopus 로고
    • Cryptography from Pairings: A Snapshot of Current Research
    • Paterson, K. (2002), 'Cryptography from Pairings: A Snapshot of Current Research', Information Security Technical Report 7(3), 41-54.
    • (2002) Information Security Technical Report , vol.7 , Issue.3 , pp. 41-54
    • Paterson, K.1
  • 23
    • 33746100516 scopus 로고    scopus 로고
    • Cryptography from pairings
    • I Blake and G Seroussi and N Smart, ed., Cambridge University Press, chapter X
    • Paterson, K. (2005), Cryptography from pairings, in I Blake and G Seroussi and N Smart, ed., 'Advances in Elliptic Curve Cryptography', Cambridge University Press, chapter X.
    • (2005) Advances in Elliptic Curve Cryptography
    • Paterson, K.1
  • 25
    • 85020598353 scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • Shamir, A. (1984), Identity-Based Cryptosystems and Signature Schemes, in 'Advances in Cryptology-CRYPTO'84', pp. 47-53.
    • (1984) Advances in Cryptology-CRYPTO'84 , pp. 47-53
    • Shamir, A.1
  • 26
    • 33646184315 scopus 로고    scopus 로고
    • Efficient Identity-Based and Authenticated Key Agreement Protocol
    • Report 2005/108
    • Wang, Y. (2005), 'Efficient Identity-Based and Authenticated Key Agreement Protocol', Cryptology ePrint Archive, Report 2005/108. http://eprint.iacr.org/2005/108.
    • (2005) Cryptology ePrint Archive
    • Wang, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.