메뉴 건너뛰기




Volumn 7, Issue 4, 2013, Pages 544-557

A novel pairing-free certificateless authenticated key agreement protocol with provable security

Author keywords

attacks; certificateless authenticated key agreement; eCK model; pairings; provable security

Indexed keywords

ATTACKS; AUTHENTICATED KEY AGREEMENT; AUTHENTICATED KEY AGREEMENT PROTOCOLS; CERTIFICATELESS; DIFFIE HELLMAN; PAIRINGS; PROVABLE SECURITY; PROVABLY SECURE;

EID: 84880802438     PISSN: 20952228     EISSN: 20952236     Source Type: Journal    
DOI: 10.1007/s11704-013-2305-1     Document Type: Article
Times cited : (36)

References (25)
  • 1
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Shamir A. Identity-based cryptosystems and signature schemes. Lecture Notes in Computer Science, 1985, 196: 47-53.
    • (1985) Lecture Notes in Computer Science , vol.196 , pp. 47-53
    • Shamir, A.1
  • 3
    • 33846923573 scopus 로고    scopus 로고
    • Certificateless authenticated key agreement based on the MTI/CO protocol
    • Wang S, Cao Z, Dong X. Certificateless authenticated key agreement based on the MTI/CO protocol. Journal of Information and Computational Science, 2006, 3(3): 575-581.
    • (2006) Journal of Information and Computational Science , vol.3 , Issue.3 , pp. 575-581
    • Wang, S.1    Cao, Z.2    Dong, X.3
  • 4
    • 33947586742 scopus 로고    scopus 로고
    • Two-party authenticated key agreement in certificateless public key cryptography
    • Shi Y, Li J. Two-party authenticated key agreement in certificateless public key cryptography. Wuhan University Journal of Natural Sciences, 2007, 12(1): 71-74.
    • (2007) Wuhan University Journal of Natural Sciences , vol.12 , Issue.1 , pp. 71-74
    • Shi, Y.1    Li, J.2
  • 6
    • 49949116357 scopus 로고    scopus 로고
    • Certificateless authenticated two-party key agreement protocols
    • Mandt T, Tan C. Certificateless authenticated two-party key agreement protocols. Lecture Notes in Computer Science, 2007, 4435: 37-44.
    • (2007) Lecture Notes in Computer Science , vol.4435 , pp. 37-44
    • Mandt, T.1    Tan, C.2
  • 7
    • 44549086712 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography
    • Wang F, Zhang Y. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Computer Communications, 2008, 31(10): 2142-2149.
    • (2008) Computer Communications , vol.31 , Issue.10 , pp. 2142-2149
    • Wang, F.1    Zhang, Y.2
  • 8
    • 77649258504 scopus 로고    scopus 로고
    • A study of two-party certificateless authenticated key agreement protocols
    • Swanson C, Jao D. A study of two-party certificateless authenticated key agreement protocols. Lecture Notes in Computer Science, 2009, 5922: 57-71.
    • (2009) Lecture Notes in Computer Science , vol.5922 , pp. 57-71
    • Swanson, C.1    Jao, D.2
  • 10
    • 73149101252 scopus 로고    scopus 로고
    • Simulatable certificateless two party authenticated key agreement protocol
    • Zhang L, Zhang F, Wu Q, Domingo-Ferrer J. Simulatable certificateless two party authenticated key agreement protocol. Information Sciences, 2010, 180(6): 1020-1030.
    • (2010) Information Sciences , vol.180 , Issue.6 , pp. 1020-1030
    • Zhang, L.1    Zhang, F.2    Wu, Q.3    Domingo-Ferrer, J.4
  • 11
    • 84856471625 scopus 로고    scopus 로고
    • Secure and efficient handover authentication based on bilinear pairing functions
    • He D, Chen C, Chan S, Bu J. Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 2012, 11(1): 48-53.
    • (2012) IEEE Transactions on Wireless Communications , vol.11 , Issue.1 , pp. 48-53
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4
  • 15
    • 80052632132 scopus 로고    scopus 로고
    • A pairing-free certificateless authenticated key agreement protocol
    • He D, Chen Y, Chen J. A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems, 2012, 25(2): 221-230.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.2 , pp. 221-230
    • He, D.1    Chen, Y.2    Chen, J.3
  • 16
    • 80052626402 scopus 로고    scopus 로고
    • A new two-round certificateless authenticated key agreement protocol without bilinear pairings
    • He D, Chen Y, Chen J, Zhang R, Han W. A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Mathematical and Computer Modelling, 2011, 54(11-12): 3143-3152.
    • (2011) Mathematical and Computer Modelling , vol.54 , Issue.11-12 , pp. 3143-3152
    • He, D.1    Chen, Y.2    Chen, J.3    Zhang, R.4    Han, W.5
  • 17
    • 80054808436 scopus 로고    scopus 로고
    • Toward pairing-free certificateless authenticated key exchanges
    • Xiong H, Wu Q, Chen Z. Toward pairing-free certificateless authenticated key exchanges. Lecture Notes in Computer Science, 2011, 7001: 79-94.
    • (2011) Lecture Notes in Computer Science , vol.7001 , pp. 79-94
    • Xiong, H.1    Wu, Q.2    Chen, Z.3
  • 20
    • 84865646945 scopus 로고    scopus 로고
    • An efficient certificateless two-party authenticated key agreement protocol
    • He D, Padhye S, Chen J. An efficient certificateless two-party authenticated key agreement protocol. Computers and Mathematics with Applications, 2012, 64(6): 1914-1926.
    • (2012) Computers and Mathematics with Applications , vol.64 , Issue.6 , pp. 1914-1926
    • He, D.1    Padhye, S.2    Chen, J.3
  • 22
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels. Lecture Notes in Computer Science, 2001, 2045: 453-474.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 24
    • 33646805409 scopus 로고    scopus 로고
    • Examining indistinguishability-based proof models for key establishment protocols
    • Choo K, Boyd C, Hitchcock Y. Examining indistinguishability-based proof models for key establishment protocols. Lecture Notes in Computer Science, 2005, 3788: 585-604.
    • (2005) Lecture Notes in Computer Science , vol.3788 , pp. 585-604
    • Choo, K.1    Boyd, C.2    Hitchcock, Y.3
  • 25
    • 4143140890 scopus 로고    scopus 로고
    • A survey of two signature aggregation techniques
    • Boneh D, Gentry C, Lynn B, Shacham H. A survey of two signature aggregation techniques. CryptoBytes, 2003, 6(2): 1-10.
    • (2003) CryptoBytes , vol.6 , Issue.2 , pp. 1-10
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.