Provably secure identity-based authenticated key agreement protocols with malicious private key generators
From MaRDI portal
Publication:621645
DOI10.1016/j.ins.2010.09.032zbMath1204.94087OpenAlexW2045419107MaRDI QIDQ621645
Hua Guo, Xiyong Zhang, Yi Mu, Zhou-Jun Li
Publication date: 28 January 2011
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2010.09.032
Related Items (4)
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol ⋮ Provably secure threshold public-key encryption with adaptive security and short ciphertexts ⋮ Certificateless two-party authenticated key agreement scheme for smart grid ⋮ Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
- An improved identity-based key agreement protocol and its security proof
- Authenticated key exchange provably secure against the man-in-the-middle attack
- Efficient identity-based authenticated key agreement protocol from pairings
- Protocols for authentification and key establishment
- Identity-Based Cryptosystems and Signature Schemes
- Efficient One-Round Key Exchange in the Standard Model
- An Identity-Based Key Agreement Protocol for the Network Layer
- Identity-based authenticated key agreement protocol based on Weil pairing
- Key agreement protocols and their security analysis
- Applied Cryptography and Network Security
- Making the Diffie-Hellman Protocol Identity-Based
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Topics in Cryptology – CT-RSA 2005
This page was built for publication: Provably secure identity-based authenticated key agreement protocols with malicious private key generators