메뉴 건너뛰기




Volumn 651, Issue , 2016, Pages 106-114

Inductive hierarchical identity based key agreement with pre-deployment interactions (I-H-IB-KA-pdi)

Author keywords

Bilinear pairing maps; Hierarchical networks; Hybrid key agreement

Indexed keywords

COMPLEX NETWORKS; CRYPTOGRAPHY; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 84989847479     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-981-10-2741-3_9     Document Type: Conference Paper
Times cited : (1)

References (12)
  • 1
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Stinson, D.R. (ed.), Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994). doi:10.1007/3-540-48329-2_21
    • (1994) CRYPTO 1993. LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 2
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • Beth, T., Cot, N., Ingemarsson, I. (eds.), Springer, Heidelberg
    • Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335-338. Springer, Heidelberg (1985). doi:10.1007/3-540-39757-4_22
    • (1985) EUROCRYPT 1984. LNCS , vol.209 , pp. 335-338
    • Blom, R.1
  • 3
  • 5
    • 57049153498 scopus 로고    scopus 로고
    • Strongly-resilient and non-interactive hierarchical key-agreement in MANETs
    • Jajodia, S., Lopez, J. (eds.), Springer, Heidelberg
    • Gennaro, R., Halevi, S., Krawczyk, H., Rabin, T., Reidt, S., Wolthusen, S.D.: Strongly-resilient and non-interactive hierarchical key-agreement in MANETs. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 49-65. Springer, Heidelberg (2008). doi:10.1007/978-3-540-88313-5_4
    • (2008) ESORICS 2008. LNCS , vol.5283 , pp. 49-65
    • Gennaro, R.1    Halevi, S.2    Krawczyk, H.3    Rabin, T.4    Reidt, S.5    Wolthusen, S.D.6
  • 6
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • Zheng, Y. (ed.), Springer, Heidelberg
    • Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg (2002). doi:10.1007/3-540-36178-2_34
    • (2002) ASIACRYPT 2002. LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 7
    • 79251598847 scopus 로고    scopus 로고
    • An efficient and non-interactive hierarchical key agreement protocol
    • Guo, H., Mu, Y., Li, Z., Zhang, X.: An efficient and non-interactive hierarchical key agreement protocol. Comput. Secur. 30(1), 28-34 (2011)
    • (2011) Comput. Secur , vol.30 , Issue.1 , pp. 28-34
    • Guo, H.1    Mu, Y.2    Li, Z.3    Zhang, X.4
  • 8
    • 84947242701 scopus 로고    scopus 로고
    • Toward hierarchical identity-based encryption
    • Knudsen, L.R. (ed.), Springer, Heidelberg
    • Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-481. Springer, Heidelberg (2002). doi:10.1007/3-540-46035-7_31
    • (2002) EUROCRYPT 2002. LNCS , vol.2332 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 9
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120-126 (1978)
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 11
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakley, G.R., Chaum, D. (eds.), Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985). doi:10.1007/3-540-39568-7_5
    • (1985) CRYPTO 1984. LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 12
    • 84895057321 scopus 로고    scopus 로고
    • On the security of an efficient and non-interactive hierarchical key agreement protocol
    • Zhu, G., Xiong, H., Qin, Z.: On the security of an efficient and non-interactive hierarchical key agreement protocol. Wireless Pers. Commun. 74(2), 883-889 (2014)
    • (2014) Wireless Pers. Commun , vol.74 , Issue.2 , pp. 883-889
    • Zhu, G.1    Xiong, H.2    Qin, Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.