Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments
From MaRDI portal
Publication:2331797
DOI10.3390/sym10040084zbMath1423.94130OpenAlexW2795281634MaRDI QIDQ2331797
Ta-Ming Liu, Chao-Liang Liu, Ting-Yi Chang, Wang-Jui Tsai
Publication date: 30 October 2019
Published in: Symmetry (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3390/sym10040084
distributed computingbilinear pairingmobile deviceautomated validation of Internet security protocols and applications (AVISPA) toolephemeral-secret-leakagethree-party authenticated key agreement protocol
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An improved two-party identity-based authenticated key agreement protocol using pairings
- An efficient user authentication and key exchange protocol for mobile client-server environment
- Password authenticated key exchange protocols among diverse network domains
- Identity-Based Cryptosystems and Signature Schemes
- Practical Identity-Based Encryption Without Random Oracles
- New directions in cryptography
- On the security of public key protocols
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Cryptography and Coding
- Information Security and Privacy
- Computer Aided Verification
This page was built for publication: Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments