Pages that link to "Item:Q1772225"
From MaRDI portal
The following pages link to A one round protocol for tripartite Diffie-Hellman (Q1772225):
Displayed 44 items.
- Provably secure one-round identity-based authenticated asymmetric group key agreement protocol (Q433086) (← links)
- Group key agreement for secure group communication in dynamic peer systems (Q455985) (← links)
- Simplified small exponent test for batch verification (Q501674) (← links)
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- On the elliptic curves \(y^{2}=x^{3} - c\) with embedding degree one (Q555157) (← links)
- Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol (Q778404) (← links)
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange (Q865906) (← links)
- A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges (Q991232) (← links)
- Computing pairings using \(x\)-coordinates only (Q1009121) (← links)
- An improved affine equivalence algorithm for random permutations (Q1648807) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- Polynomial interpolation of the generalized Diffie-Hellman and Naor-Reingold functions (Q1755993) (← links)
- KCI-resilient anonymous wireless link-layer authentication protocols (Q1933901) (← links)
- Simple and exact formula for minimum loop length in \(\mathrm{Ate}_{i }\) pairing based on Brezing-Weng curves (Q1943983) (← links)
- Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation (Q2182074) (← links)
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves (Q2191198) (← links)
- An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries (Q2216128) (← links)
- On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited (Q2275939) (← links)
- Refined analysis to the extended tower number field sieve (Q2304549) (← links)
- Koblitz curves over quadratic fields (Q2318090) (← links)
- Explicit formula for optimal ate pairing over cyclotomic family of elliptic curves (Q2348162) (← links)
- Predicate encryption supporting disjunctions, polynomial equations, and inner products (Q2377068) (← links)
- Wildcarded identity-based encryption (Q2429713) (← links)
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks (Q2456502) (← links)
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH (Q2697676) (← links)
- NIKE from affine determinant programs (Q2697912) (← links)
- How to Avoid Obfuscation Using Witness PRFs (Q2799104) (← links)
- Authenticated asymmetric group key agreement based on certificateless cryptosystem (Q2875291) (← links)
- The multiple number field sieve for medium- and high-characteristic finite fields (Q2878838) (← links)
- RNS arithmetic in 𝔽 pk and application to fast pairing computation (Q3015225) (← links)
- Communication-Efficient 2-Round Group Key Establishment from Pairings (Q3073695) (← links)
- Publicly Verifiable Secret Sharing for Cloud-Based Key Management (Q3104748) (← links)
- Faster Pairings on Special Weierstrass Curves (Q3392905) (← links)
- Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials (Q3600499) (← links)
- Pairing Computation on Twisted Edwards Form Elliptic Curves (Q3600505) (← links)
- Asymmetric Group Key Agreement (Q3627433) (← links)
- Computing $(\ell ,\ell )$-isogenies in polynomial time on Jacobians of genus $2$ curves (Q5246849) (← links)
- Another Approach to Pairing Computation in Edwards Coordinates (Q5504639) (← links)
- On Cycles of Pairing-Friendly Elliptic Curves (Q5742695) (← links)
- Tensors in computations (Q5887832) (← links)
- Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs (Q6057185) (← links)
- Multi-input non-interactive functional encryption: constructions and applications (Q6057217) (← links)
- Individual discrete logarithm with sublattice reduction (Q6070357) (← links)
- Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds) (Q6157529) (← links)