Simulatable certificateless two-party authenticated key agreement protocol
From MaRDI portal
Publication:2269791
DOI10.1016/j.ins.2009.11.036zbMath1185.94085MaRDI QIDQ2269791
Qianhong Wu, Josep Domingo-Ferrer, Fu-Tai Zhang, Lei Zhang
Publication date: 11 March 2010
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2009.11.036
provable security; information security; authenticated key agreement; certificateless cryptography; protocol design
94A62: Authentication, digital signatures and secret sharing
Related Items
Nonce-Based Key Agreement Protocol Against Bad Randomness, An efficient certificateless two-party authenticated key agreement protocol, A new two-round certificateless authenticated key agreement protocol without bilinear pairings, Provably secure one-round identity-based authenticated asymmetric group key agreement protocol, Provably secure threshold public-key encryption with adaptive security and short ciphertexts, Certificateless one-pass and two-party authenticated key agreement protocol and its extensions, Certificateless threshold signature scheme from bilinear maps, Signatures in hierarchical certificateless cryptography: efficient constructions and provable security, Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings, Provably secure and efficient certificateless authenticated tripartite key agreement protocol, Certificateless two-party authenticated key agreement scheme for smart grid, Comment on a certificateless one-pass and two-party authenticated key agreement protocol, A novel pairing-free certificateless authenticated key agreement protocol with provable security, Efficient three-party authenticated key agreement protocol in certificateless cryptography
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Certificateless threshold ring signature
- Breaking the short certificateless signature scheme
- Certificateless undeniable signature scheme
- Identity-Based Cryptosystems and Signature Schemes
- Identity-based authenticated key agreement protocol based on Weil pairing
- Certificateless Signature Revisited
- Asymmetric Group Key Agreement
- New directions in cryptography
- Key agreement protocols and their security analysis
- Modular Security Proofs for Key Agreement Protocols
- Topics in Cryptology – CT-RSA 2005
- Advances in Cryptology - ASIACRYPT 2003