메뉴 건너뛰기




Volumn 293, Issue , 2015, Pages 182-195

Certificateless one-pass and two-party authenticated key agreement protocol and its extensions

Author keywords

Authentication; Certificateless cryptography; Key agreement; One pass

Indexed keywords

AUTHENTICATION; NETWORK SECURITY;

EID: 84922625583     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2014.09.022     Document Type: Article
Times cited : (18)

References (28)
  • 1
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Lecture Notes in Computer Science Springer-Verlag
    • S. Al-Riyami, and K. Paterson Certificateless public key cryptography Asiacrypt-2003 Lecture Notes in Computer Science vol. 2894 2003 Springer-Verlag 452 473
    • (2003) Asiacrypt-2003 , vol.2894 , pp. 452-473
    • Al-Riyami, S.1    Paterson, K.2
  • 2
    • 24144432124 scopus 로고    scopus 로고
    • Efficient multi-receiver identity-based encryption and its application to broadcast encryption
    • J. Baek, R. Safavi-Naini, W. Susilo, Efficient multi-receiver identity-based encryption and its application to broadcast encryption, in: PKC 2005, Lecture Notes in Computer Science, vol. 3386, 2005, pp. 380-397.
    • (2005) PKC 2005, Lecture Notes in Computer Science , vol.3386 , pp. 380-397
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 3
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Lecture Notes in Computer Science Springer-Verlag
    • M. Bellare, and P. Rogaway Entity authentication and key distribution CRYPTO 1993 Lecture Notes in Computer Science vol. 773 1994 Springer-Verlag 232 249
    • (1994) CRYPTO 1993 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis
    • Lecture Notes in Computer Science Springer-Verlag
    • S. Blake-Wilson, D. Johason, and A. Menezes Key agreement protocols and their security analysis 6th IMA International Conference Lecture Notes in Computer Science vol. 1355 1997 Springer-Verlag 30 45
    • (1997) 6th IMA International Conference , vol.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johason, D.2    Menezes, A.3
  • 5
    • 74049114529 scopus 로고    scopus 로고
    • Certificateless one-way authenticated two-party key agreement protocol
    • W. Chen, L. Zhang, B. Qin, Q. Wu, H. Zhang, Certificateless one-way authenticated two-party key agreement protocol, in: IEEE IAS 2009, 2009, pp. 483-486.
    • (2009) IEEE IAS 2009 , pp. 483-486
    • Chen, W.1    Zhang, L.2    Qin, B.3    Wu, Q.4    Zhang, H.5
  • 6
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: A high-performance secure Diffie-Hellman protocol
    • Lecture Notes in Computer Science Springer-Verlag
    • H. Krawczyk HMQV: a high-performance secure Diffie-Hellman protocol Crypto 2005 Lecture Notes in Computer Science vol. 3621 2005 Springer-Verlag 546 566
    • (2005) Crypto 2005 , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 7
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Lecture Notes in Computer Science Springer-Verlag
    • R. Canetti, and H. Krawczyk Analysis of key-exchange protocols and their use for building secure channels EUROCRYPT 2001 Lecture Notes in Computer Science vol. 2045 2001 Springer-Verlag 453C474
    • (2001) EUROCRYPT 2001 , vol.2045 , pp. 453C474
    • Canetti, R.1    Krawczyk, H.2
  • 10
    • 84865646945 scopus 로고    scopus 로고
    • An efficient certificateless two-party authenticated key agreement protocol
    • D. He, S. Padhye, and J. Chen An efficient certificateless two-party authenticated key agreement protocol Comput. Math. Appl. 64 6 2012 1914 1926
    • (2012) Comput. Math. Appl. , vol.64 , Issue.6 , pp. 1914-1926
    • He, D.1    Padhye, S.2    Chen, J.3
  • 11
    • 38149080541 scopus 로고    scopus 로고
    • Certificateless signature revisited
    • Lecture Notes in Computer Science Springer-Verlag
    • X. Huang, Y. Mu, W. Susilo, D. Wong, and W. Wu Certificateless signature revisited ACISP 2007 Lecture Notes in Computer Science vol. 4586 2007 Springer-Verlag 308 322
    • (2007) ACISP 2007 , vol.4586 , pp. 308-322
    • Huang, X.1    Mu, Y.2    Susilo, W.3    Wong, D.4    Wu, W.5
  • 12
    • 84876307417 scopus 로고    scopus 로고
    • A new certificateless authenticated key agreement protocol for SIP with different KGCs
    • doi:10.1002/Section595
    • X. Li, Y. Zhang, G. Zhang, A new certificateless authenticated key agreement protocol for SIP with different KGCs, Secur. Commun. Networks. http://dx.doi.org/10.1002/Section595.
    • Secur. Commun. Networks
    • Li, X.1    Zhang, Y.2    Zhang, G.3
  • 14
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • G. Lowe An attack on the Needham-Schroeder public-key authentication protocol Inform. Process. Lett. 56 3 1995 131 133
    • (1995) Inform. Process. Lett. , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 15
    • 58349101975 scopus 로고    scopus 로고
    • An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography
    • M. Luo, Y. Wen, H. Zhao, An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography, in: IEEE ICYCS 2008, 2008, pp. 1577-1582.
    • (2008) IEEE ICYCS 2008 , pp. 1577-1582
    • Luo, M.1    Wen, Y.2    Zhao, H.3
  • 16
    • 49949116357 scopus 로고    scopus 로고
    • Certificateless authenticated two-party key agreement protocols
    • Lecture Notes in Computer Science Springer-Verlag
    • T. Mandt, and C. Tan Certificateless authenticated two-party key agreement protocols ASIAN 2006 Lecture Notes in Computer Science vol. 4435 2008 Springer-Verlag 37 44
    • (2008) ASIAN 2006 , vol.4435 , pp. 37-44
    • Mandt, T.1    Tan, C.2
  • 17
    • 84937389342 scopus 로고    scopus 로고
    • The gap-problems: A new class of problems for the security of cryptographic schemes
    • Lecture Notes in Computer Science Springer-Verlag
    • T. Okamoto, and D. Pointcheval The gap-problems: a new class of problems for the security of cryptographic schemes PKC 2001 Lecture Notes in Computer Science vol. 1992 2001 Springer-Verlag 104 118
    • (2001) PKC 2001 , vol.1992 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 19
    • 26944463841 scopus 로고    scopus 로고
    • One-way and two-party authenticated ID-based key agreement protocols using pairing
    • Lecture Notes in Computer Science Springer-Verlag
    • T. Okamoto, R. Tso, and E. Okamoto One-way and two-party authenticated ID-based key agreement protocols using pairing MDAI 2005 Lecture Notes in Computer Science vol. 3558 2005 Springer-Verlag 122 133
    • (2005) MDAI 2005 , vol.3558 , pp. 122-133
    • Okamoto, T.1    Tso, R.2    Okamoto, E.3
  • 20
    • 77649258504 scopus 로고    scopus 로고
    • A Study of two-party certificateless authenticated key-agreement protocols
    • Lecture Notes in Computer Science Springer-Verlag
    • C. Swanson, and D. Jao A Study of two-party certificateless authenticated key-agreement protocols INDOCRYPT 2009 Lecture Notes in Computer Science vol. 5922 2009 Springer-Verlag 57 71
    • (2009) INDOCRYPT 2009 , vol.5922 , pp. 57-71
    • Swanson, C.1    Jao, D.2
  • 21
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • Lecture Notes in Computer Science Springer-Verlag
    • A. Shamir Identity based cryptosystems and signature schemes Crypto 1984 Lecture Notes in Computer Science vol.196 1984 Springer-Verlag 47 53
    • (1984) Crypto 1984 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 22
  • 23
    • 35048854587 scopus 로고    scopus 로고
    • An efficient signature scheme from bilinear pairings and its applications
    • Lecture Notes in Computer Science Springer-Verlag < >
    • F. Zhang, R. Safavi-Naini, and W. Susilo An efficient signature scheme from bilinear pairings and its applications PKC 2004 Lecture Notes in Computer Science vol. 2947 2004 Springer-Verlag 277 290 < http://www.uow.edu.au/wsusilo/PKC04.pdf >
    • (2004) PKC 2004 , vol.2947 , pp. 277-290
    • Zhang, F.1    Safavi-Naini, R.2    Susilo, W.3
  • 24
    • 84857368369 scopus 로고    scopus 로고
    • An efficient RSA-based certificateless signature scheme
    • J. Zhang, and J. Mao An efficient RSA-based certificateless signature scheme J. Syst. Software 85 3 2012 638 642
    • (2012) J. Syst. Software , vol.85 , Issue.3 , pp. 638-642
    • Zhang, J.1    Mao, J.2
  • 25
    • 84875980869 scopus 로고    scopus 로고
    • Provably secure certificateless one-way and two-party authenticated key agreement protocol
    • Lecture Notes in Computer Science Springer-Verlag
    • L. Zhang Provably secure certificateless one-way and two-party authenticated key agreement protocol ICISC 2012 Lecture Notes in Computer Science vol. 7839 2013 Springer-Verlag 217 230
    • (2013) ICISC 2012 , vol.7839 , pp. 217-230
    • Zhang, L.1
  • 26
    • 79960186888 scopus 로고    scopus 로고
    • Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
    • L. Zhang, Q. Wu, B. Qin, and J. Domingo-Ferrer Provably secure one-round identity-based authenticated asymmetric group key agreement protocol Inform. Sci. 181 19 2011 4318 4329
    • (2011) Inform. Sci. , vol.181 , Issue.19 , pp. 4318-4329
    • Zhang, L.1    Wu, Q.2    Qin, B.3    Domingo-Ferrer, J.4
  • 27
    • 73149101252 scopus 로고    scopus 로고
    • Simulatable certificateless two-party authenticated key agreement protocol
    • L. Zhang, F. Zhang, Q. Wu, and J. Domingo-Ferrer Simulatable certificateless two-party authenticated key agreement protocol Inform. Sci. 180 6 2010 1020 1030
    • (2010) Inform. Sci. , vol.180 , Issue.6 , pp. 1020-1030
    • Zhang, L.1    Zhang, F.2    Wu, Q.3    Domingo-Ferrer, J.4
  • 28
    • 84899471806 scopus 로고    scopus 로고
    • Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security
    • L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, and P. Zeng Signatures in hierarchical certificateless cryptography: efficient constructions and provable security Inform. Sci. 272 2014 223 237
    • (2014) Inform. Sci. , vol.272 , pp. 223-237
    • Zhang, L.1    Wu, Q.2    Domingo-Ferrer, J.3    Qin, B.4    Zeng, P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.