Security weaknesses of a signature scheme and authenticated key agreement protocols
From MaRDI portal
Publication:2445398
DOI10.1016/j.ipl.2013.11.005zbMath1285.94109OpenAlexW2084437673MaRDI QIDQ2445398
Publication date: 14 April 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2013.11.005
cryptographyidentity-basedaggregate signaturekey authenticationdeterministic signaturetwo-party key agreement
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An improved two-party identity-based authenticated key agreement protocol using pairings
- The Weil pairing, and its efficient calculation
- Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures
- Identity-Based Cryptosystems and Signature Schemes
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- Stronger Security of Authenticated Key Exchange
- Identity-based authenticated key agreement protocol based on Weil pairing
- New directions in cryptography
- A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves
- Key agreement protocols and their security analysis
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
- Batch Verifications with ID-Based Signatures
- Topics in Cryptology – CT-RSA 2005
- Cryptology and Network Security
- Public Key Cryptography - PKC 2006
- Public Key Cryptography – PKC 2004
This page was built for publication: Security weaknesses of a signature scheme and authenticated key agreement protocols