Provably secure non-interactive key distribution based on pairings
From MaRDI portal
Publication:2489921
DOI10.1016/j.dam.2005.03.024zbMath1091.94023OpenAlexW2091767251MaRDI QIDQ2489921
Publication date: 28 April 2006
Published in: Discrete Applied Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.dam.2005.03.024
Related Items (6)
Signal-flow-based analysis of wireless security protocols ⋮ Identity-based non-interactive key distribution with forward security ⋮ Towards tight adaptive security of non-interactive key exchange ⋮ Non-Interactive Key Exchange ⋮ On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups ⋮ A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A non-interactive public-key distribution system
- Building curves with arbitrary small MOV degree over finite prime fields
- Elliptic curves suitable for pairing based cryptography
- Identity-Based Cryptosystems and Signature Schemes
- Identity-based authenticated key agreement protocol based on Weil pairing
- Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups
- A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves
- Reducing elliptic curve logarithms to logarithms in a finite field
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - CRYPTO 2003
This page was built for publication: Provably secure non-interactive key distribution based on pairings